CVE-2011-1174

manager.c in Asterisk Open Source 1.6.1.x before 1.6.1.24, 1.6.2.x before 1.6.2.17.2, and 1.8.x before 1.8.3.2 allows remote attackers to cause a denial of service (CPU and memory consumption) via a series of manager sessions involving invalid data.
References
Link Resource
http://downloads.asterisk.org/pub/security/AST-2011-003.html Vendor Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056945.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057156.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057163.html
http://openwall.com/lists/oss-security/2011/03/17/5
http://openwall.com/lists/oss-security/2011/03/21/12
http://securitytracker.com/id?1025223
http://www.debian.org/security/2011/dsa-2225
http://www.securityfocus.com/bid/46897
http://www.vupen.com/english/advisories/2011/0686 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0790 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=688675
https://exchange.xforce.ibmcloud.com/vulnerabilities/66139
http://downloads.asterisk.org/pub/security/AST-2011-003.html Vendor Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056945.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057156.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057163.html
http://openwall.com/lists/oss-security/2011/03/17/5
http://openwall.com/lists/oss-security/2011/03/21/12
http://securitytracker.com/id?1025223
http://www.debian.org/security/2011/dsa-2225
http://www.securityfocus.com/bid/46897
http://www.vupen.com/english/advisories/2011/0686 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0790 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=688675
https://exchange.xforce.ibmcloud.com/vulnerabilities/66139
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:digium:asterisk:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1:beta1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1:beta2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1:beta3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1:beta4:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.0:rc4:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.0:rc5:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.3:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.4:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.5:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.5:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.6:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.7:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.7:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.8:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.9:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.10:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.10:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.10:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.10:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.11:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.12:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.12:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.13:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.13:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.14:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.15:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.16:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.17:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.18:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.18:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.18:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.19:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.19:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.19:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.19:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.20:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.20:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.20:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.21:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.22:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.23:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:digium:asterisk:1.6.2.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.0:rc4:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.0:rc5:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.0:rc6:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.0:rc7:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.0:rc8:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.1:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.3:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.4:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.5:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.6:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.6:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.6:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.15:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.16:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.16:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.16.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.17:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.17:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.17:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.17:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.17.1:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:25

Type Values Removed Values Added
References () http://downloads.asterisk.org/pub/security/AST-2011-003.html - Vendor Advisory () http://downloads.asterisk.org/pub/security/AST-2011-003.html - Vendor Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056945.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056945.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057156.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057156.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057163.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057163.html -
References () http://openwall.com/lists/oss-security/2011/03/17/5 - () http://openwall.com/lists/oss-security/2011/03/17/5 -
References () http://openwall.com/lists/oss-security/2011/03/21/12 - () http://openwall.com/lists/oss-security/2011/03/21/12 -
References () http://securitytracker.com/id?1025223 - () http://securitytracker.com/id?1025223 -
References () http://www.debian.org/security/2011/dsa-2225 - () http://www.debian.org/security/2011/dsa-2225 -
References () http://www.securityfocus.com/bid/46897 - () http://www.securityfocus.com/bid/46897 -
References () http://www.vupen.com/english/advisories/2011/0686 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0686 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0790 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0790 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=688675 - () https://bugzilla.redhat.com/show_bug.cgi?id=688675 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/66139 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/66139 -

Information

Published : 2011-03-31 22:55

Updated : 2024-11-21 01:25


NVD link : CVE-2011-1174

Mitre link : CVE-2011-1174

CVE.ORG link : CVE-2011-1174


JSON object : View

Products Affected

digium

  • asterisk
CWE
CWE-399

Resource Management Errors