The handle_request_info function in channels/chan_sip.c in Asterisk Open Source 1.6.2.x before 1.6.2.21 and 1.8.x before 1.8.7.2, when automon is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted sequence of SIP requests.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 01:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://downloads.asterisk.org/pub/security/AST-2011-014.html - | |
References | () http://openwall.com/lists/oss-security/2011/12/09/3 - | |
References | () http://openwall.com/lists/oss-security/2011/12/09/4 - | |
References | () http://osvdb.org/77598 - | |
References | () http://secunia.com/advisories/47273 - | |
References | () http://www.debian.org/security/2011/dsa-2367 - |
Information
Published : 2011-12-15 03:57
Updated : 2024-11-21 01:32
NVD link : CVE-2011-4598
Mitre link : CVE-2011-4598
CVE.ORG link : CVE-2011-4598
JSON object : View
Products Affected
digium
- asterisk
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor