Vulnerability Description
reqresp_parser.c in the SIP channel driver in Asterisk Open Source 1.8.x before 1.8.4.3 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a SIP packet with a Contact header that lacks a < (less than) character.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Digium | Asterisk | 1.8.0 |
References
- http://downloads.asterisk.org/pub/security/AST-2011-009-1.8.diffPatch
- http://downloads.asterisk.org/pub/security/AST-2011-009.htmlVendor Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062628.html
- http://secunia.com/advisories/45048Vendor Advisory
- http://secunia.com/advisories/45201
- http://secunia.com/advisories/45239
- http://www.debian.org/security/2011/dsa-2276
- http://downloads.asterisk.org/pub/security/AST-2011-009-1.8.diffPatch
- http://downloads.asterisk.org/pub/security/AST-2011-009.htmlVendor Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062628.html
- http://secunia.com/advisories/45048Vendor Advisory
- http://secunia.com/advisories/45201
- http://secunia.com/advisories/45239
- http://www.debian.org/security/2011/dsa-2276
FAQ
What is CVE-2011-2665?
CVE-2011-2665 is a vulnerability with a CVSS score of 5.0 (MEDIUM). reqresp_parser.c in the SIP channel driver in Asterisk Open Source 1.8.x before 1.8.4.3 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a SIP packe...
How severe is CVE-2011-2665?
CVE-2011-2665 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-2665?
Check the references section above for vendor advisories and patch information. Affected products include: Digium Asterisk.