CVE-2012-2947

LOW

Description

chan_iax2.c in the IAX2 channel driver in Certified Asterisk 1.8.11-cert before 1.8.11-cert2 and Asterisk Open Source 1.8.x before 1.8.12.1 and 10.x before 10.4.1, when a certain mohinterpret setting is enabled, allows remote attackers to cause a denial of service (daemon crash) by placing a call on hold.

References

http://archives.neohapsis.com/archives/bugtraq/2012-05/0144.html

http://downloads.asterisk.org/pub/security/AST-2012-007.html

http://secunia.com/advisories/49303

http://www.debian.org/security/2012/dsa-2493

http://www.securitytracker.com/id?1027102

Details

Source: MITRE

Published: 2012-06-02

Updated: 2017-11-13

Type: CWE-284

Risk Information

CVSS v2.0

Base Score: 2.6

Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 4.9

Severity: LOW

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.8.0:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.8.0:rc1:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.8.0:rc2:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.8.0:rc3:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.8.0:rc4:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.8.0:rc5:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.8.1:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.8.2:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.9.0:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.9.0:rc1:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.9.0:rc2:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.9.0:rc3:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.9.1:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.9.2:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.9.3:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.10.0:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.10.0:rc1:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.10.0:rc2:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.10.0:rc3:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.10.0:rc4:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.10.1:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.11.0:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.11.0:rc2:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.11.0:rc3:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.11.1:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.12:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.12.0:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.12.0:rc1:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.12.0:rc2:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:1.8.12.0:rc3:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:a:digium:asterisk:10.0.0:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:10.0.0:beta1:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:10.0.0:beta2:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:10.0.0:rc1:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:10.0.0:rc2:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:10.0.0:rc3:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:10.0.1:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:10.1.0:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:10.1.0:rc1:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:10.1.0:rc2:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:10.1.1:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:10.1.2:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:10.1.3:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:10.2.0:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:10.2.0:rc1:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:10.2.0:rc2:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:10.2.0:rc3:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:10.2.0:rc4:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:10.2.1:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:10.3.0:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:10.3.0:rc2:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:10.3.0:rc3:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:10.3.1:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:10.4.0:*:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:10.4.0:rc1:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:10.4.0:rc2:*:*:*:*:*:*

cpe:2.3:a:digium:asterisk:10.4.0:rc3:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:a:digium:certified_asterisk:1.8.11:cert:*:*:*:*:*:*

cpe:2.3:a:digium:certified_asterisk:1.8.11:cert1:*:*:*:*:*:*

Tenable Plugins

View all (7 total)

IDNameProductFamilySeverity
59771Debian DSA-2493-1 : asterisk - denial of serviceNessusDebian Local Security Checks
medium
59633GLSA-201206-05 : Asterisk: Multiple vulnerabilitiesNessusGentoo Local Security Checks
medium
59533Fedora 16 : asterisk-1.8.12.2-1.fc16 (2012-8692)NessusFedora Local Security Checks
low
59532Fedora 15 : asterisk-1.8.12.2-1.fc15 (2012-8685)NessusFedora Local Security Checks
low
59503Asterisk Remote Crash Vulnerability in IAX2 Channel Driver (AST-2012-007)NessusMisc.
low
59434Fedora 17 : asterisk-10.4.2-1.fc17 (2012-8670)NessusFedora Local Security Checks
low
59302FreeBSD : asterisk -- multiple vulnerabilities (359f615d-a9e1-11e1-8a66-14dae9ebcf89)NessusFreeBSD Local Security Checks
medium