CVE-2011-2216
Published: 6 June 2011
reqresp_parser.c in the SIP channel driver in Asterisk Open Source 1.8.x before 1.8.4.2 does not initialize certain strings, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed Contact header.
Notes
Author | Note |
---|---|
mdeslaur | may be 1.8.x only, need to check |
Priority
Status
Package | Release | Status |
---|---|---|
asterisk Launchpad, Ubuntu, Debian |
hardy |
Ignored
(end of life)
|
lucid |
Not vulnerable
(1:1.6.2.5-0ubuntu1.3)
|
|
maverick |
Not vulnerable
(1:1.6.2.7-1ubuntu1.1)
|
|
natty |
Not vulnerable
(1:1.6.2.9-2ubuntu2)
|
|
oneiric |
Not vulnerable
(1:1.8.4.4~dfsg-2ubuntu1)
|
|
precise |
Not vulnerable
(1:1.8.10.1~dfsg-1ubuntu1)
|
|
quantal |
Not vulnerable
(1:1.8.10.1~dfsg-1ubuntu1)
|
|
upstream |
Released
(1.8.4.2)
|
|
Patches: upstream: http://downloads.asterisk.org/pub/security/AST-2011-007-1.8.diff |