CVE-2009-0871
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
11/03/2009
Last modified:
09/04/2025
Description
The SIP channel driver in Asterisk Open Source 1.4.22, 1.4.23, and 1.4.23.1; 1.6.0 before 1.6.0.6; 1.6.1 before 1.6.1.0-rc2; and Asterisk Business Edition C.2.3, with the pedantic option enabled, allows remote authenticated users to cause a denial of service (crash) via a SIP INVITE request without any headers, which triggers a NULL pointer dereference in the (1) sip_uri_headers_cmp and (2) sip_uri_params_cmp functions.
Impact
Base Score 2.0
3.50
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:digium:asterisk:1.4.22:*:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.4.23:*:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.4.23.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.6.0:beta1:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.6.0:beta2:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.6.0:beta3:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.6.0:beta4:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.6.0:beta5:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.6.0:beta6:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.6.0:beta7:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.6.0:beta7.1:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.6.0:beta8:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.6.0:beta9:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.6.0:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.digium.com/view.php?id=13547
- http://bugs.digium.com/view.php?id=14417
- http://downloads.digium.com/pub/security/AST-2009-002.html
- http://osvdb.org/52568
- http://secunia.com/advisories/34229
- http://www.securityfocus.com/archive/1/501656/100/0/threaded
- http://www.securityfocus.com/bid/34070
- http://www.securitytracker.com/id?1021834=
- http://www.vupen.com/english/advisories/2009/0667
- http://bugs.digium.com/view.php?id=13547
- http://bugs.digium.com/view.php?id=14417
- http://downloads.digium.com/pub/security/AST-2009-002.html
- http://osvdb.org/52568
- http://secunia.com/advisories/34229
- http://www.securityfocus.com/archive/1/501656/100/0/threaded
- http://www.securityfocus.com/bid/34070
- http://www.securitytracker.com/id?1021834=
- http://www.vupen.com/english/advisories/2009/0667



