Double free vulnerability in the WebSocket Server (res_http_websocket module) in Asterisk Open Source 11.x before 11.14.2, 12.x before 12.7.2, and 13.x before 13.0.2 and Certified Asterisk 11.6 before 11.6-cert9 allows remote attackers to cause a denial of service (crash) by sending a zero length frame after a non-zero length frame.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 02:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://advisories.mageia.org/MGASA-2015-0010.html - | |
References | () http://downloads.asterisk.org/pub/security/AST-2014-019.html - Patch, Vendor Advisory | |
References | () http://packetstormsecurity.com/files/129473/Asterisk-Project-Security-Advisory-AST-2014-019.html - | |
References | () http://seclists.org/fulldisclosure/2014/Dec/48 - | |
References | () http://secunia.com/advisories/60251 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2015:018 - | |
References | () http://www.securityfocus.com/archive/1/534197/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/71607 - | |
References | () http://www.securitytracker.com/id/1031345 - |
Information
Published : 2014-12-12 15:59
Updated : 2024-11-21 02:20
NVD link : CVE-2014-9374
Mitre link : CVE-2014-9374
CVE.ORG link : CVE-2014-9374
JSON object : View
Products Affected
digium
- asterisk
- certified_asterisk
CWE