CVE-2011-2665
Published: 6 July 2011
reqresp_parser.c in the SIP channel driver in Asterisk Open Source 1.8.x before 1.8.4.3 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a SIP packet with a Contact header that lacks a < (less than) character.
Notes
Author | Note |
---|---|
mdeslaur | probably 1.8.x only |
Priority
Status
Package | Release | Status |
---|---|---|
asterisk Launchpad, Ubuntu, Debian |
hardy |
Ignored
(end of life)
|
lucid |
Not vulnerable
(1:1.6.2.5-0ubuntu1.3)
|
|
maverick |
Not vulnerable
(1:1.6.2.7-1ubuntu1.1)
|
|
natty |
Not vulnerable
(1:1.6.2.9-2ubuntu2)
|
|
oneiric |
Not vulnerable
(1:1.8.4.4~dfsg-2ubuntu1)
|
|
precise |
Not vulnerable
(1:1.8.10.1~dfsg-1ubuntu1)
|
|
quantal |
Not vulnerable
(1:1.8.10.1~dfsg-1ubuntu1)
|
|
upstream |
Released
(1.8.4.3)
|
|
Patches: upstream: http://downloads.asterisk.org/pub/security/AST-2011-009-1.8.diff |