Bug 2368030 (CVE-2025-47779) - CVE-2025-47779 asterisk: Using malformed From header can forge identity with ";" or NULL in name portion
Summary: CVE-2025-47779 asterisk: Using malformed From header can forge identity with ...
Keywords:
Status: NEW
Alias: CVE-2025-47779
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2395448 2395449 2395450
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-05-22 17:01 UTC by OSIDB Bzimport
Modified: 2025-09-15 15:53 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-05-22 17:01:54 UTC
Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk, SIP requests of the type MESSAGE (RFC 3428) authentication do not get proper alignment. An authenticated attacker can spoof any user identity to send spam messages to the user with their authorization token. Abuse of this security issue allows authenticated attackers to send fake chat messages can be spoofed to appear to come from trusted entities. Even administrators who follow Security best practices and Security Considerations can be impacted. Therefore, abuse can lead to spam and enable social engineering, phishing and similar attacks. Versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk fix the issue.


Note You need to log in before you can comment on or make changes to this bug.