CVE-2011-4063

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

chan_sip.c in the SIP channel driver in Asterisk Open Source 1.8.x before 1.8.7.1 and 10.x before 10.0.0-rc1 does not properly initialize variables during request parsing, which allows remote authenticated users to cause a denial of service (daemon crash) via a malformed request.

References

http://downloads.digium.com/pub/security/AST-2011-012.html

http://secunia.com/advisories/46420

http://securityreason.com/securityalert/8478

http://www.securityfocus.com/archive/1/520141/100/0/threaded

http://www.securityfocus.com/bid/50177

http://www.securitytracker.com/id?1026191

https://exchange.xforce.ibmcloud.com/vulnerabilities/70706

Details

Source: MITRE

Published: 2011-10-21

Updated: 2018-10-09

Type: CWE-20

Risk Information

CVSS v2

Base Score: 6.8

Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C

Impact Score: 6.9

Exploitability Score: 8

Severity: MEDIUM

Tenable Plugins

View all (6 total)

IDNameProductFamilySeverity
56922Asterisk SIP Channel Driver Uninitialized Variable Request Parsing DoS (AST-2011-012)NessusDenial of Service
medium
56788Fedora 15 : asterisk-1.8.7.1-1.fc15 (2011-14538)NessusFedora Local Security Checks
medium
56787Fedora 16 : asterisk-1.8.7.1-1.fc16 (2011-14480)NessusFedora Local Security Checks
medium
56625GLSA-201110-21 : Asterisk: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
6043Asterisk Remote Crash Vulnerability in SIP Channel Driver (AST-2011-012)Nessus Network MonitorGeneric
medium
56527FreeBSD : asterisk -- remote crash vulnerability in SIP channel driver (a95092a6-f8f1-11e0-a7ea-00215c6a37bb)NessusFreeBSD Local Security Checks
medium