CVE-2009-0871

The SIP channel driver in Asterisk Open Source 1.4.22, 1.4.23, and 1.4.23.1; 1.6.0 before 1.6.0.6; 1.6.1 before 1.6.1.0-rc2; and Asterisk Business Edition C.2.3, with the pedantic option enabled, allows remote authenticated users to cause a denial of service (crash) via a SIP INVITE request without any headers, which triggers a NULL pointer dereference in the (1) sip_uri_headers_cmp and (2) sip_uri_params_cmp functions.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:digium:asterisk:1.4.22:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.23:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.23.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.0:beta1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.0:beta2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.0:beta3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.0:beta4:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.0:beta5:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.0:beta6:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.0:beta7:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.0:beta7.1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.0:beta8:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.0:beta9:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.0:rc4:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.0:rc5:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.0:rc6:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.0.3:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.0.3:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.0.4:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.0.5:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1:beta1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1:beta2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1:beta3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1:beta4:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:c.2.3:-:business:*:*:*:*:*

History

21 Nov 2024, 01:01

Type Values Removed Values Added
References () http://bugs.digium.com/view.php?id=13547 - () http://bugs.digium.com/view.php?id=13547 -
References () http://bugs.digium.com/view.php?id=14417 - () http://bugs.digium.com/view.php?id=14417 -
References () http://downloads.digium.com/pub/security/AST-2009-002.html - Patch, Vendor Advisory () http://downloads.digium.com/pub/security/AST-2009-002.html - Patch, Vendor Advisory
References () http://osvdb.org/52568 - () http://osvdb.org/52568 -
References () http://secunia.com/advisories/34229 - Vendor Advisory () http://secunia.com/advisories/34229 - Vendor Advisory
References () http://www.securityfocus.com/archive/1/501656/100/0/threaded - () http://www.securityfocus.com/archive/1/501656/100/0/threaded -
References () http://www.securityfocus.com/bid/34070 - Patch () http://www.securityfocus.com/bid/34070 - Patch
References () http://www.securitytracker.com/id?1021834 - () http://www.securitytracker.com/id?1021834 -
References () http://www.vupen.com/english/advisories/2009/0667 - () http://www.vupen.com/english/advisories/2009/0667 -

Information

Published : 2009-03-11 14:19

Updated : 2024-11-21 01:01


NVD link : CVE-2009-0871

Mitre link : CVE-2009-0871

CVE.ORG link : CVE-2009-0871


JSON object : View

Products Affected

digium

  • asterisk
CWE
CWE-20

Improper Input Validation