CVE-2016-2316
Severity CVSS v4.0:
Pending analysis
Type:
CWE-191
Integer Underflow (Wrap or Wraparound)
Publication date:
22/02/2016
Last modified:
12/04/2025
Description
chan_sip in Asterisk Open Source 1.8.x, 11.x before 11.21.1, 12.x, and 13.x before 13.7.1 and Certified Asterisk 1.8.28, 11.6 before 11.6-cert12, and 13.1 before 13.1-cert3, when the timert1 sip.conf configuration is set to a value greater than 1245, allows remote attackers to cause a denial of service (file descriptor consumption) via vectors related to large retransmit timeout values.
Impact
Base Score 3.x
5.90
Severity 3.x
MEDIUM
Base Score 2.0
7.10
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:* | ||
| cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://downloads.asterisk.org/pub/security/AST-2016-002.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177409.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177422.html
- http://www.debian.org/security/2016/dsa-3700
- http://www.securityfocus.com/bid/82651
- http://www.securitytracker.com/id/1034930
- http://downloads.asterisk.org/pub/security/AST-2016-002.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177409.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177422.html
- http://www.debian.org/security/2016/dsa-3700
- http://www.securityfocus.com/bid/82651
- http://www.securitytracker.com/id/1034930



