Vulnerability Description
chan_sip.c in the SIP channel driver in Asterisk Open Source 1.8.x before 1.8.11.1 and 10.x before 10.3.1 and Asterisk Business Edition C.3.x before C.3.7.4, when the trustrpid option is enabled, allows remote authenticated users to cause a denial of service (daemon crash) by sending a SIP UPDATE message that triggers a connected-line update attempt without an associated channel.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Asterisk | Open Source | 1.6.2.0 |
Related Weaknesses (CWE)
References
- http://downloads.asterisk.org/pub/security/AST-2012-006.htmlPatchVendor Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079759.html
- http://osvdb.org/81456
- http://secunia.com/advisories/48891
- http://www.securityfocus.com/bid/53205
- http://www.securitytracker.com/id?1026963
- https://exchange.xforce.ibmcloud.com/vulnerabilities/75101
- https://issues.asterisk.org/jira/browse/ASTERISK-19770
- http://downloads.asterisk.org/pub/security/AST-2012-006.htmlPatchVendor Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079759.html
- http://osvdb.org/81456
- http://secunia.com/advisories/48891
- http://www.securityfocus.com/bid/53205
- http://www.securitytracker.com/id?1026963
- https://exchange.xforce.ibmcloud.com/vulnerabilities/75101
FAQ
What is CVE-2012-2416?
CVE-2012-2416 is a vulnerability with a CVSS score of 6.5 (MEDIUM). chan_sip.c in the SIP channel driver in Asterisk Open Source 1.8.x before 1.8.11.1 and 10.x before 10.3.1 and Asterisk Business Edition C.3.x before C.3.7.4, when the trustrpid option is enabled, allo...
How severe is CVE-2012-2416?
CVE-2012-2416 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-2416?
Check the references section above for vendor advisories and patch information. Affected products include: Asterisk Open Source.