CVE-2011-1175

tcptls.c in the TCP/TLS server in Asterisk Open Source 1.6.1.x before 1.6.1.23, 1.6.2.x before 1.6.2.17.1, and 1.8.x before 1.8.3.1 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by establishing many short TCP sessions to services that use a certain TLS API.
References
Link Resource
http://downloads.asterisk.org/pub/security/AST-2011-004.html Patch Vendor Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056945.html Patch
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057156.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057163.html
http://openwall.com/lists/oss-security/2011/03/17/5
http://openwall.com/lists/oss-security/2011/03/21/12 Patch
http://securitytracker.com/id?1025224
http://www.debian.org/security/2011/dsa-2225
http://www.securityfocus.com/bid/46898
http://www.vupen.com/english/advisories/2011/0686 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0790 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=688678
https://exchange.xforce.ibmcloud.com/vulnerabilities/66140
http://downloads.asterisk.org/pub/security/AST-2011-004.html Patch Vendor Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056945.html Patch
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057156.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057163.html
http://openwall.com/lists/oss-security/2011/03/17/5
http://openwall.com/lists/oss-security/2011/03/21/12 Patch
http://securitytracker.com/id?1025224
http://www.debian.org/security/2011/dsa-2225
http://www.securityfocus.com/bid/46898
http://www.vupen.com/english/advisories/2011/0686 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0790 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=688678
https://exchange.xforce.ibmcloud.com/vulnerabilities/66140
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:digium:asterisk:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1:beta1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1:beta2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1:beta3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1:beta4:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.0:rc4:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.0:rc5:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.3:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.4:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.5:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.5:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.6:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.7:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.7:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.8:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.9:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.10:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.10:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.10:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.10:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.11:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.12:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.12:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.13:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.13:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.14:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.15:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.16:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.17:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.18:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.18:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.18:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.19:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.19:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.19:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.19:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.20:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.20:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.20:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.21:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1.22:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:digium:asterisk:1.6.2.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.0:rc4:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.0:rc5:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.0:rc6:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.0:rc7:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.0:rc8:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.1:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.3:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.4:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.5:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.6:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.6:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.6:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.15:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.16:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.16:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.16.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.17:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.17:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.17:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.2.17:rc3:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*

History

21 Nov 2024, 01:25

Type Values Removed Values Added
References () http://downloads.asterisk.org/pub/security/AST-2011-004.html - Patch, Vendor Advisory () http://downloads.asterisk.org/pub/security/AST-2011-004.html - Patch, Vendor Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056945.html - Patch () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056945.html - Patch
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057156.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057156.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057163.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057163.html -
References () http://openwall.com/lists/oss-security/2011/03/17/5 - () http://openwall.com/lists/oss-security/2011/03/17/5 -
References () http://openwall.com/lists/oss-security/2011/03/21/12 - Patch () http://openwall.com/lists/oss-security/2011/03/21/12 - Patch
References () http://securitytracker.com/id?1025224 - () http://securitytracker.com/id?1025224 -
References () http://www.debian.org/security/2011/dsa-2225 - () http://www.debian.org/security/2011/dsa-2225 -
References () http://www.securityfocus.com/bid/46898 - () http://www.securityfocus.com/bid/46898 -
References () http://www.vupen.com/english/advisories/2011/0686 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0686 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0790 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0790 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=688678 - () https://bugzilla.redhat.com/show_bug.cgi?id=688678 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/66140 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/66140 -

Information

Published : 2011-03-31 22:55

Updated : 2024-11-21 01:25


NVD link : CVE-2011-1175

Mitre link : CVE-2011-1175

CVE.ORG link : CVE-2011-1175


JSON object : View

Products Affected

digium

  • asterisk