CVE-2011-4598
Published: 15 December 2011
The handle_request_info function in channels/chan_sip.c in Asterisk Open Source 1.6.2.x before 1.6.2.21 and 1.8.x before 1.8.7.2, when automon is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted sequence of SIP requests.
Priority
Status
Package | Release | Status |
---|---|---|
asterisk Launchpad, Ubuntu, Debian |
hardy |
Not vulnerable
|
lucid |
Ignored
(end of life)
|
|
maverick |
Ignored
(end of life)
|
|
natty |
Ignored
(end of life)
|
|
oneiric |
Ignored
(end of life)
|
|
precise |
Not vulnerable
(1:1.8.10.1~dfsg-1ubuntu1)
|
|
quantal |
Not vulnerable
|
|
raring |
Not vulnerable
|
|
saucy |
Not vulnerable
|
|
upstream |
Released
(1.6.2.21, 1.8.7.2)
|
|
Patches: other: http://downloads.asterisk.org/pub/security/AST-2011-014-1.6.2.diff other: http://downloads.asterisk.org/pub/security/AST-2011-014-1.8.diff vendor: http://www.debian.org/security/2011/dsa-2367 |