CVE-2014-9374
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
12/12/2014
Last modified:
12/04/2025
Description
Double free vulnerability in the WebSocket Server (res_http_websocket module) in Asterisk Open Source 11.x before 11.14.2, 12.x before 12.7.2, and 13.x before 13.0.2 and Certified Asterisk 11.6 before 11.6-cert9 allows remote attackers to cause a denial of service (crash) by sending a zero length frame after a non-zero length frame.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:lts:*:*:* | ||
| cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:lts:*:*:* | ||
| cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:lts:*:*:* | ||
| cpe:2.3:a:digium:certified_asterisk:11.6:cert4:*:*:lts:*:*:* | ||
| cpe:2.3:a:digium:certified_asterisk:11.6:cert5:*:*:lts:*:*:* | ||
| cpe:2.3:a:digium:certified_asterisk:11.6:cert6:*:*:lts:*:*:* | ||
| cpe:2.3:a:digium:certified_asterisk:11.6:cert7:*:*:lts:*:*:* | ||
| cpe:2.3:a:digium:certified_asterisk:11.6:cert8:*:*:lts:*:*:* | ||
| cpe:2.3:a:digium:certified_asterisk:11.6.0:*:*:*:lts:*:*:* | ||
| cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://advisories.mageia.org/MGASA-2015-0010.html
- http://downloads.asterisk.org/pub/security/AST-2014-019.html
- http://packetstormsecurity.com/files/129473/Asterisk-Project-Security-Advisory-AST-2014-019.html
- http://seclists.org/fulldisclosure/2014/Dec/48
- http://secunia.com/advisories/60251
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A018
- http://www.securityfocus.com/archive/1/534197/100/0/threaded
- http://www.securityfocus.com/bid/71607
- http://www.securitytracker.com/id/1031345
- http://advisories.mageia.org/MGASA-2015-0010.html
- http://downloads.asterisk.org/pub/security/AST-2014-019.html
- http://packetstormsecurity.com/files/129473/Asterisk-Project-Security-Advisory-AST-2014-019.html
- http://seclists.org/fulldisclosure/2014/Dec/48
- http://secunia.com/advisories/60251
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A018
- http://www.securityfocus.com/archive/1/534197/100/0/threaded
- http://www.securityfocus.com/bid/71607
- http://www.securitytracker.com/id/1031345



