Vulnerability CVE-2013-2686


Published: 2013-04-01

Description:
main/http.c in the HTTP server in Asterisk Open Source 1.8.x before 1.8.20.2, 10.x before 10.12.2, and 11.x before 11.2.2; Certified Asterisk 1.8.15 before 1.8.15-cert2; and Asterisk Digiumphones 10.x-digiumphones before 10.12.2-digiumphones does not properly restrict Content-Length values, which allows remote attackers to conduct stack-consumption attacks and cause a denial of service (daemon crash) via a crafted HTTP POST request. NOTE: this vulnerability exists because of an incorrect fix for CVE-2012-5976.

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

Vendor: Asterisk
Product: Open source 
Version:
11.2.1
11.2.0
11.1.2
11.1.1
11.1.0
11.0.2
11.0.1
11.0.0
10.9.0
10.8.0
10.7.1
10.7.0
10.6.1
10.6.0
10.5.2
10.5.1
10.5.0
10.4.2
10.4.1
10.4.0
10.3.1
10.3.0
10.2.1
10.2.0
10.12.1
10.12.0
10.11.1
10.11.0
10.10.1
10.10.0
10.1.3
10.1.2
10.1.1
10.1.0
10.0.1
10.0.0
1.8.9.3
1.8.9.2
1.8.9.1
1.8.9.0
1.8.8.2
1.8.8.1
1.8.8.0
1.8.7.2
1.8.7.1
1.8.7.0
1.8.6.0
1.8.5.0
1.8.5
1.8.4.4
1.8.4.3
1.8.4.2
1.8.4.1
1.8.4
1.8.3.3
1.8.3.2
1.8.3.1
1.8.3
1.8.20.1
1.8.20.0
1.8.2.4
1.8.2.3
1.8.2.2
1.8.2.1
1.8.2
1.8.19.1
1.8.19.0
1.8.18.1
1.8.18.0
1.8.17.0
1.8.16.0
1.8.15.1
1.8.15.0
1.8.14.1
1.8.14.0
1.8.13.1
1.8.13.0
1.8.12.2
1.8.12.1
1.8.12.0
1.8.12
1.8.11.1
1.8.11.0
1.8.10.1
See more versions on NVD
Product: Digiumphones 
Version:
10.9.0
10.8.0
10.7.0
10.6.0
10.5.0
10.4.0
10.3.0
10.2.0
10.12.1
10.12.0
10.11.0
10.10.0
10.1.0
10.0.0
See more versions on NVD
Product: Certified asterisk 
Version: 1.8.15.0; 1.8.15;

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial

 References:
https://issues.asterisk.org/jira/browse/ASTERISK-20967
http://telussecuritylabs.com/threats/show/TSL20130327-01
http://downloads.asterisk.org/pub/security/AST-2013-002.html

Related CVE
CVE-2017-9358
A memory exhaustion vulnerability exists in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1 and Certified Asterisk 13.13 before 13.13-cert4, which can be triggered by sending specially crafted SCCP packets causing a infinite loop and ...
CVE-2016-9937
An issue was discovered in Asterisk Open Source 13.12.x and 13.13.x before 13.13.1 and 14.x before 14.2.1. If an SDP offer or answer is received with the Opus codec and with the format parameters separated using a space the code responsible for parsi...
CVE-2016-9938
An issue was discovered in Asterisk Open Source 11.x before 11.25.1, 13.x before 13.13.1, and 14.x before 14.2.1 and Certified Asterisk 11.x before 11.6-cert16 and 13.x before 13.8-cert4. The chan_sip channel driver has a liberal definition for white...
CVE-2014-8418
The DB dialplan function in Asterisk Open Source 1.8.x before 1.8.32, 11.x before 11.1.4.1, 12.x before 12.7.1, and 13.x before 13.0.1 and Certified Asterisk 1.8 before 1.8.28-cert8 and 11.6 before 11.6-cert8 allows remote authenticated users to gain...
CVE-2014-8417
ConfBridge in Asterisk 11.x before 11.14.1, 12.x before 12.7.1, and 13.x before 13.0.1 and Certified Asterisk 11.6 before 11.6-cert8 allows remote authenticated users to (1) gain privileges via vectors related to an external protocol to the CONFBRIDG...
CVE-2014-8416
Use-after-free vulnerability in the PJSIP channel driver in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1, when using the res_pjsip_refer module, allows remote attackers to cause a denial of service (crash) via an in-dialog INVITE wi...
CVE-2014-8415
Race condition in the chan_pjsip channel driver in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1 allows remote attackers to cause a denial of service (assertion failure and crash) via a cancel request for a SIP session with a queued ...
CVE-2014-8414
ConfBridge in Asterisk 11.x before 11.14.1 and Certified Asterisk 11.6 before 11.6-cert8 does not properly handle state changes, which allows remote attackers to cause a denial of service (channel hang and memory consumption) by causing transitions t...

Copyright 2019, cxsecurity.com

 

Back to Top