Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2011-2665

Overview

Vulnerability Score 5.0 5.0
CVE Id CVE-2011-2665
Last Modified 06 Sep 2011 11:17:44
Published 06 Jul 2011 03:55:03
Confidentiality Impact NONE NONE
Integrity Impact NONE NONE
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2011-2665

Summary

reqresp_parser.c in the SIP channel driver in Asterisk Open Source 1.8.x before 1.8.4.3 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a SIP packet with a Contact header that lacks a < (less than) character.

Vulnerable Systems

Application

  • Digium Asterisk 1.8.0

  • Digium Asterisk 1.8.1

  • Digium Asterisk 1.8.1.1

  • Digium Asterisk 1.8.1.2

  • Digium Asterisk 1.8.2

  • Digium Asterisk 1.8.2.1

  • Digium Asterisk 1.8.2.2

  • Digium Asterisk 1.8.2.3

  • Digium Asterisk 1.8.2.4

  • Digium Asterisk 1.8.3

  • Digium Asterisk 1.8.3.1

  • Digium Asterisk 1.8.3.2

  • Digium Asterisk 1.8.3.3

  • Digium Asterisk 1.8.4

  • Digium Asterisk 1.8.4.1

  • Digium Asterisk 1.8.4.2


References

CONFIRM - http://downloads.asterisk.org/pub/security/AST-2011-009-1.8.diff

DEBIAN - DSA-2276

SECUNIA - 45239

SECUNIA - 45201

SECUNIA - 45048

FEDORA - FEDORA-2011-8914

CONFIRM - http://downloads.asterisk.org/pub/security/AST-2011-009.html


Last Updated: 27 May 2016 10:57:04