Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2009-0871

Overview

Vulnerability Score 3.5 3.5
CVE Id CVE-2009-0871
Last Modified 21 Mar 2009 01:55:07
Published 11 Mar 2009 10:19:15
Confidentiality Impact NONE NONE
Integrity Impact NONE NONE
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity MEDIUM
Authentication SINGLE_INSTANCE

CVE-2009-0871

Summary

The SIP channel driver in Asterisk Open Source 1.4.22, 1.4.23, and 1.4.23.1; 1.6.0 before 1.6.0.6; 1.6.1 before 1.6.1.0-rc2; and Asterisk Business Edition C.2.3, with the pedantic option enabled, allows remote authenticated users to cause a denial of service (crash) via a SIP INVITE request without any headers, which triggers a NULL pointer dereference in the (1) sip_uri_headers_cmp and (2) sip_uri_params_cmp functions.

Vulnerable Systems

Application

  • Digium Asterisk 1.4.22

  • Digium Asterisk 1.4.23

  • Digium Asterisk 1.4.23.1

  • Digium Asterisk 1.6.0

  • Digium Asterisk 1.6.0.1

  • Digium Asterisk 1.6.0.2

  • Digium Asterisk 1.6.0.3

  • Digium Asterisk 1.6.0.4

  • Digium Asterisk 1.6.0.5

  • Digium Asterisk 1.6.1

  • Digium Asterisk C.2.3


References

BID - 34070

CONFIRM - http://downloads.digium.com/pub/security/AST-2009-002.html

VUPEN - ADV-2009-0667

SECTRACK - 1021834

BUGTRAQ - 20090310 AST-2009-002: Remote Crash Vulnerability in SIP channel driver

SECUNIA - 34229

OSVDB - 52568

CONFIRM - http://bugs.digium.com/view.php?id=14417

CONFIRM - http://bugs.digium.com/view.php?id=13547


Last Updated: 27 May 2016 10:50:24