Vulnerability CVE-2011-4063


Published: 2011-10-21   Modified: 2012-02-13

Description:
chan_sip.c in the SIP channel driver in Asterisk Open Source 1.8.x before 1.8.7.1 and 10.x before 10.0.0-rc1 does not properly initialize variables during request parsing, which allows remote authenticated users to cause a denial of service (daemon crash) via a malformed request.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
astersik open source 1.8.7 Remote crash vulnerability
Asterisk Securit...
26.10.2011

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:L/Au:S/C:N/I:N/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.9/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
None
None
Complete
Affected software
Asterisk -> Open source 

 References:
http://downloads.digium.com/pub/security/AST-2011-012.html
http://securityreason.com/securityalert/8478
http://www.securityfocus.com/archive/1/520141/100/0/threaded
http://www.securityfocus.com/bid/50177
http://www.securitytracker.com/id?1026191
https://exchange.xforce.ibmcloud.com/vulnerabilities/70706

Copyright 2024, cxsecurity.com

 

Back to Top