main/rtp.c in Asterisk Open Source 1.6.1 before 1.6.1.2 allows remote attackers to cause a denial of service (crash) via an RTP text frame without a certain delimiter, which triggers a NULL pointer dereference and the subsequent calculation of an invalid pointer.
References
Configurations
History
21 Nov 2024, 01:05
Type | Values Removed | Values Added |
---|---|---|
References | () http://downloads.asterisk.org/pub/security/AST-2009-004.html - Vendor Advisory | |
References | () http://downloads.digium.com/pub/security/AST-2009-004-1.6.1.diff.txt - Exploit | |
References | () http://osvdb.org/56571 - | |
References | () http://secunia.com/advisories/36039 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/35837 - | |
References | () http://www.securitytracker.com/id?1022608 - | |
References | () http://www.vupen.com/english/advisories/2009/2067 - Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/52046 - |
Information
Published : 2009-07-30 20:00
Updated : 2024-11-21 01:05
NVD link : CVE-2009-2651
Mitre link : CVE-2009-2651
CVE.ORG link : CVE-2009-2651
JSON object : View
Products Affected
digium
- asterisk
CWE