The SIP channel driver (channels/chan_sip.c) in Asterisk Open Source 1.8.17.x up to and including 1.8.22.x, 1.8.23.x prior to 1.8.23.1, and 11.x prior to 11.5.1 and Certified Asterisk 1.8.15 prior to 1.8.15-cert3 and 11.2 prior to 11.2-cert2 allows remote malicious users to cause a denial of service (NULL pointer dereference, segmentation fault, and daemon crash) via an ACK with SDP to a previously terminated channel. NOTE: some of these details are obtained from third party information.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
digium certified asterisk 1.8.15 |
||
digium asterisk 11.4.0 |
||
digium asterisk 11.0.0 |
||
digium asterisk 11.1.0 |
||
digium asterisk 1.8.20.0 |
||
digium asterisk 1.8.17.0 |
||
digium asterisk 1.8.19.0 |
||
digium asterisk 1.8.19.1 |
||
digium certified asterisk 11.2.0 |
||
digium asterisk 11.5.0 |
||
digium asterisk 11.0.1 |
||
digium asterisk 11.2.0 |
||
digium asterisk 1.8.23.0 |
||
digium asterisk 1.8.22.0 |
||
digium asterisk 1.8.18.0 |
||
digium asterisk 1.8.18.1 |
||
digium asterisk 11.3.0 |
||
digium asterisk 11.5.1 |
||
digium asterisk 11.0.2 |
||
digium asterisk 11.1.1 |
||
digium asterisk 11.1.2 |
||
digium asterisk 1.8.21.0 |