The SIP channel driver in Asterisk Open Source 1.4.22, 1.4.23, and 1.4.23.1; 1.6.0 before 1.6.0.6; 1.6.1 before 1.6.1.0-rc2; and Asterisk Business Edition C.2.3, with the pedantic option enabled, allows remote authenticated users to cause a denial of service (crash) via a SIP INVITE request without any headers, which triggers a NULL pointer dereference in the (1) sip_uri_headers_cmp and (2) sip_uri_params_cmp functions.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.digium.com/view.php?id=13547 - | |
References | () http://bugs.digium.com/view.php?id=14417 - | |
References | () http://downloads.digium.com/pub/security/AST-2009-002.html - Patch, Vendor Advisory | |
References | () http://osvdb.org/52568 - | |
References | () http://secunia.com/advisories/34229 - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/501656/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/34070 - Patch | |
References | () http://www.securitytracker.com/id?1021834 - | |
References | () http://www.vupen.com/english/advisories/2009/0667 - |
Information
Published : 2009-03-11 14:19
Updated : 2024-11-21 01:01
NVD link : CVE-2009-0871
Mitre link : CVE-2009-0871
CVE.ORG link : CVE-2009-0871
JSON object : View
Products Affected
digium
- asterisk
CWE
CWE-20
Improper Input Validation