Vulnerability CVE-2014-9374


Published: 2014-12-12

Description:
Double free vulnerability in the WebSocket Server (res_http_websocket module) in Asterisk Open Source 11.x before 11.14.2, 12.x before 12.7.2, and 13.x before 13.0.2 and Certified Asterisk 11.6 before 11.6-cert9 allows remote attackers to cause a denial of service (crash) by sending a zero length frame after a non-zero length frame.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Asterisk WebSocket Server Remote Crash
oshua Colp
11.12.2014

Type:

CWE-Other

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
Digium -> Asterisk 
Digium -> Certified asterisk 

 References:
http://advisories.mageia.org/MGASA-2015-0010.html
http://downloads.asterisk.org/pub/security/AST-2014-019.html
http://packetstormsecurity.com/files/129473/Asterisk-Project-Security-Advisory-AST-2014-019.html
http://seclists.org/fulldisclosure/2014/Dec/48
http://www.mandriva.com/security/advisories?name=MDVSA-2015:018
http://www.securityfocus.com/archive/1/534197/100/0/threaded
http://www.securityfocus.com/bid/71607
http://www.securitytracker.com/id/1031345

Copyright 2024, cxsecurity.com

 

Back to Top