[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2276-1 asterisk -- multiple denial of service

ID: oval:org.secpod.oval:def:600587Date: (C)2011-07-12   (M)2022-10-10
Class: PATCHFamily: unix




Paul Belanger reported a vulnerability in Asterisk identified as AST-2011-008 through which an unauthenticated attacker may crash an Asterisk server remotely. A package containing a null char causes the SIP header parser to alter unrelated memory structures. Jared Mauch reported a vulnerability in Asterisk identified as AST-2011-009 through which an unauthenticated attacker may crash an Asterisk server remotely. If a user sends a package with a Contact header with a missing left angle bracket the server will crash. A possible workaround is to disable chan_sip. The vulnerability identified as AST-2011-010 reported about an input validation error in the IAX2 channel driver. An unauthenticated attacker may crash an Asterisk server remotely by sending a crafted option control frame.

Platform:
Debian 5.0
Debian 6.0
Product:
asterisk
Reference:
DSA-2276-1
CVE-2011-2529
CVE-2011-2535
CVE    2
CVE-2011-2535
CVE-2011-2529
CPE    3
cpe:/a:asterisk:asterisk
cpe:/o:debian:debian_linux:5.0
cpe:/o:debian:debian_linux:6.0

© SecPod Technologies