Asterisk 1.4 prior to 1.4.1 and 1.2 prior to 1.2.16 allows remote malicious users to cause a denial of service (crash) by sending a Session Initiation Protocol (SIP) packet without a URI and SIP-version header, which results in a NULL pointer dereference.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
digium asterisk 1.2.12.1 |
||
digium asterisk 1.2.13 |
||
digium asterisk 1.2_beta1 |
||
digium asterisk 1.2_beta2 |
||
digium asterisk 1.2.11 |
||
digium asterisk 1.2.12 |
||
digium asterisk 1.2.8 |
||
digium asterisk 1.2.9 |
||
digium asterisk 1.2.0_beta1 |
||
digium asterisk 1.2.14 |
||
digium asterisk 1.2.15 |
||
digium asterisk 1.4.0 |
||
digium asterisk 1.4.0_beta1 |
||
digium asterisk 1.4.0_beta2 |
||
digium asterisk 1.2.0_beta2 |
||
digium asterisk 1.2.10 |
||
digium asterisk 1.2.6 |
||
digium asterisk 1.2.7 |