Lucene search

K
cve[email protected]CVE-2013-5641
HistorySep 09, 2013 - 5:55 p.m.

CVE-2013-5641

2013-09-0917:55:06
CWE-119
web.nvd.nist.gov
114
asterisk
open source
sip
channel driver
cve-2013-5641
denial of service
null pointer dereference
segmentation fault

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

6.4 Medium

AI Score

Confidence

Low

0.843 High

EPSS

Percentile

98.5%

The SIP channel driver (channels/chan_sip.c) in Asterisk Open Source 1.8.17.x through 1.8.22.x, 1.8.23.x before 1.8.23.1, and 11.x before 11.5.1 and Certified Asterisk 1.8.15 before 1.8.15-cert3 and 11.2 before 11.2-cert2 allows remote attackers to cause a denial of service (NULL pointer dereference, segmentation fault, and daemon crash) via an ACK with SDP to a previously terminated channel. NOTE: some of these details are obtained from third party information.

Affected configurations

NVD
Node
digiumasteriskMatch1.8.17.0
OR
digiumasteriskMatch1.8.17.0rc1
OR
digiumasteriskMatch1.8.17.0rc2
OR
digiumasteriskMatch1.8.17.0rc3
OR
digiumasteriskMatch1.8.18.0
OR
digiumasteriskMatch1.8.18.0rc1
OR
digiumasteriskMatch1.8.18.1
OR
digiumasteriskMatch1.8.19.0
OR
digiumasteriskMatch1.8.19.0rc1
OR
digiumasteriskMatch1.8.19.0rc3
OR
digiumasteriskMatch1.8.19.1
OR
digiumasteriskMatch1.8.20.0
OR
digiumasteriskMatch1.8.20.0rc1
OR
digiumasteriskMatch1.8.20.0rc2
OR
digiumasteriskMatch1.8.21.0rc1
OR
digiumasteriskMatch1.8.21.0rc2
OR
digiumasteriskMatch1.8.22.0
OR
digiumasteriskMatch1.8.22.0rc1
OR
digiumasteriskMatch1.8.22.0rc2
OR
digiumasteriskMatch1.8.23.0
OR
digiumasteriskMatch1.8.23.0rc1
OR
digiumasteriskMatch1.8.23.0rc2
OR
digiumasteriskMatch11.0.0
OR
digiumasteriskMatch11.0.0beta1
OR
digiumasteriskMatch11.0.0beta2
OR
digiumasteriskMatch11.0.0rc1
OR
digiumasteriskMatch11.0.0rc2
OR
digiumasteriskMatch11.0.1
OR
digiumasteriskMatch11.0.2
OR
digiumasteriskMatch11.1.0
OR
digiumasteriskMatch11.1.0rc1
OR
digiumasteriskMatch11.1.0rc3
OR
digiumasteriskMatch11.1.1
OR
digiumasteriskMatch11.1.2
OR
digiumasteriskMatch11.2.0rc1
OR
digiumasteriskMatch11.2.0rc2
OR
digiumasteriskMatch11.3.0rc1
OR
digiumasteriskMatch11.3.0rc2
OR
digiumasteriskMatch11.4.0
OR
digiumasteriskMatch11.4.0rc1
OR
digiumasteriskMatch11.4.0rc2
OR
digiumasteriskMatch11.4.0rc3
OR
digiumasteriskMatch11.5.0
OR
digiumasteriskMatch11.5.0rc1
OR
digiumasteriskMatch11.5.0rc2
OR
digiumasteriskMatch11.5.1
OR
digiumcertified_asteriskMatch1.8.15
OR
digiumcertified_asteriskMatch1.8.15cert1
OR
digiumcertified_asteriskMatch1.8.15cert1-rc1
OR
digiumcertified_asteriskMatch1.8.15cert1-rc2
OR
digiumcertified_asteriskMatch1.8.15cert1-rc3
OR
digiumcertified_asteriskMatch1.8.15cert2
OR
digiumcertified_asteriskMatch1.8.15rc1
OR
digiumcertified_asteriskMatch11.2.0
OR
digiumcertified_asteriskMatch11.2.0cert1
OR
digiumcertified_asteriskMatch11.2.0rc1
OR
digiumcertified_asteriskMatch11.2.0rc2

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

6.4 Medium

AI Score

Confidence

Low

0.843 High

EPSS

Percentile

98.5%