CVE-2010-0441
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
04/02/2010
Last modified:
11/04/2025
Description
Asterisk Open Source 1.6.0.x before 1.6.0.22, 1.6.1.x before 1.6.1.14, and 1.6.2.x before 1.6.2.2, and Business Edition C.3 before C.3.3.2, allows remote attackers to cause a denial of service (daemon crash) via an SIP T.38 negotiation with an SDP FaxMaxDatagram field that is (1) missing, (2) modified to contain a negative number, or (3) modified to contain a large number.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:asterisk:asterisk:1.6.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:asterisk:asterisk:1.6.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:asterisk:asterisk:1.6.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:asterisk:asterisk:1.6.0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:asterisk:asterisk:1.6.0.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:asterisk:asterisk:1.6.0.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:asterisk:asterisk:1.6.0.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:asterisk:asterisk:1.6.0.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:asterisk:asterisk:1.6.0.9:*:*:*:*:*:*:* | ||
cpe:2.3:a:asterisk:asterisk:1.6.0.10:*:*:*:*:*:*:* | ||
cpe:2.3:a:asterisk:asterisk:1.6.0.12:*:*:*:*:*:*:* | ||
cpe:2.3:a:asterisk:asterisk:1.6.0.13:*:*:*:*:*:*:* | ||
cpe:2.3:a:asterisk:asterisk:1.6.0.14:*:*:*:*:*:*:* | ||
cpe:2.3:a:asterisk:asterisk:1.6.0.15:*:*:*:*:*:*:* | ||
cpe:2.3:a:asterisk:asterisk:1.6.0.16-rc1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.0.diff
- http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.1.diff
- http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.2.diff
- http://downloads.asterisk.org/pub/security/AST-2010-001.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037679.html
- http://secunia.com/advisories/38395
- http://secunia.com/advisories/39096
- http://securitytracker.com/id?1023532=
- http://www.securityfocus.com/archive/1/509327/100/0/threaded
- http://www.securityfocus.com/bid/38047
- http://www.vupen.com/english/advisories/2010/0289
- https://issues.asterisk.org/view.php?id=16517
- https://issues.asterisk.org/view.php?id=16634
- https://issues.asterisk.org/view.php?id=16724
- http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.0.diff
- http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.1.diff
- http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.2.diff
- http://downloads.asterisk.org/pub/security/AST-2010-001.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037679.html
- http://secunia.com/advisories/38395
- http://secunia.com/advisories/39096
- http://securitytracker.com/id?1023532=
- http://www.securityfocus.com/archive/1/509327/100/0/threaded
- http://www.securityfocus.com/bid/38047
- http://www.vupen.com/english/advisories/2010/0289
- https://issues.asterisk.org/view.php?id=16517
- https://issues.asterisk.org/view.php?id=16634
- https://issues.asterisk.org/view.php?id=16724