CVE-2014-6610

Asterisk Open Source 11.x before 11.12.1 and 12.x before 12.5.1 and Certified Asterisk 11.6 before 11.6-cert6, when using the res_fax_spandsp module, allows remote authenticated users to cause a denial of service (crash) via an out of call message, which is not properly handled in the ReceiveFax dialplan application.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:11.6:cert4:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:11.6:cert5:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:11.6.0:*:*:*:lts:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.2.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.3.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.3.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.4.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.4.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.4.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.4.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.4.0:rc4:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.5.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.5.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.6.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.6.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.6.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.7.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.7.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.7.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.8.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.8.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.8.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.8.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.9.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.9.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.9.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.9.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.10.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.10.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.11.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.11.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.12.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:12.1.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:12.2.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:12.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:12.2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:12.2.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:12.3.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:12.3.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:12.3.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:12.4.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:12.4.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:12.5.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:12.5.0:rc1:*:*:*:*:*:*

History

21 Nov 2024, 02:14

Type Values Removed Values Added
References () http://downloads.asterisk.org/pub/security/AST-2014-010.html - Patch, Vendor Advisory () http://downloads.asterisk.org/pub/security/AST-2014-010.html - Patch, Vendor Advisory

Information

Published : 2014-11-26 15:59

Updated : 2024-11-21 02:14


NVD link : CVE-2014-6610

Mitre link : CVE-2014-6610

CVE.ORG link : CVE-2014-6610


JSON object : View

Products Affected

digium

  • asterisk
  • certified_asterisk
CWE
CWE-19

Data Processing Errors