Asterisk Open Source 1.2.26 up to and including 1.2.30.3 and Business Edition B.2.3.5 through B.2.5.5, when realtime IAX2 users are enabled, allows remote malicious users to cause a denial of service (crash) via authentication attempts involving (1) an unknown user or (2) a user using hostname matching.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
asterisk open source 1.2.26.2 |
||
asterisk open source 1.2.30.3 |
||
asterisk asterisk business edition b.2.5.0 |
||
asterisk open source 1.2.26 |
||
asterisk open source 1.2.27 |
||
asterisk asterisk business edition b.2.5.1 |
||
asterisk asterisk business edition b.2.5.3 |
||
asterisk asterisk business edition b.2.3.5 |
||
asterisk open source 1.2.28 |
||
asterisk open source 1.2.29 |
||
asterisk asterisk business edition b.2.3.4 |
||
asterisk open source 1.2.26.1 |
||
asterisk open source 1.2.30 |
||
asterisk open source 1.2.30.2 |