CVE-2014-2288
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
18/04/2014
Last modified:
12/04/2025
Description
The PJSIP channel driver in Asterisk Open Source 12.x before 12.1.1, when qualify_frequency "is enabled on an AOR and the remote SIP server challenges for authentication of the resulting OPTIONS request," allows remote attackers to cause a denial of service (crash) via a PJSIP endpoint that does not have an associated outgoing request.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:digium:asterisk:12.1.0:-:*:*:*:*:*:* | ||
cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:* | ||
cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:* | ||
cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://downloads.asterisk.org/pub/security/AST-2014-003-12.diff
- http://downloads.asterisk.org/pub/security/AST-2014-003.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130400.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130426.html
- https://issues.asterisk.org/jira/browse/ASTERISK-23210
- http://downloads.asterisk.org/pub/security/AST-2014-003-12.diff
- http://downloads.asterisk.org/pub/security/AST-2014-003.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130400.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130426.html
- https://issues.asterisk.org/jira/browse/ASTERISK-23210