CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
AI Score
Confidence
High
EPSS
Percentile
97.1%
Asterisk Open Source 1.6.0.x before 1.6.0.22, 1.6.1.x before 1.6.1.14, and 1.6.2.x before 1.6.2.2, and Business Edition C.3 before C.3.3.2, allows remote attackers to cause a denial of service (daemon crash) via an SIP T.38 negotiation with an SDP FaxMaxDatagram field that is (1) missing, (2) modified to contain a negative number, or (3) modified to contain a large number.
Vendor | Product | Version | CPE |
---|---|---|---|
asterisk | asterisk | 1.6.0 | cpe:2.3:a:asterisk:asterisk:1.6.0:*:*:*:*:*:*:* |
asterisk | asterisk | 1.6.0.1 | cpe:2.3:a:asterisk:asterisk:1.6.0.1:*:*:*:*:*:*:* |
asterisk | asterisk | 1.6.0.2 | cpe:2.3:a:asterisk:asterisk:1.6.0.2:*:*:*:*:*:*:* |
asterisk | asterisk | 1.6.0.3 | cpe:2.3:a:asterisk:asterisk:1.6.0.3:*:*:*:*:*:*:* |
asterisk | asterisk | 1.6.0.5 | cpe:2.3:a:asterisk:asterisk:1.6.0.5:*:*:*:*:*:*:* |
asterisk | asterisk | 1.6.0.6 | cpe:2.3:a:asterisk:asterisk:1.6.0.6:*:*:*:*:*:*:* |
asterisk | asterisk | 1.6.0.7 | cpe:2.3:a:asterisk:asterisk:1.6.0.7:*:*:*:*:*:*:* |
asterisk | asterisk | 1.6.0.8 | cpe:2.3:a:asterisk:asterisk:1.6.0.8:*:*:*:*:*:*:* |
asterisk | asterisk | 1.6.0.9 | cpe:2.3:a:asterisk:asterisk:1.6.0.9:*:*:*:*:*:*:* |
asterisk | asterisk | 1.6.0.10 | cpe:2.3:a:asterisk:asterisk:1.6.0.10:*:*:*:*:*:*:* |
downloads.asterisk.org/pub/security/AST-2010-001-1.6.0.diff
downloads.asterisk.org/pub/security/AST-2010-001-1.6.1.diff
downloads.asterisk.org/pub/security/AST-2010-001-1.6.2.diff
downloads.asterisk.org/pub/security/AST-2010-001.html
lists.fedoraproject.org/pipermail/package-announce/2010-March/037679.html
secunia.com/advisories/38395
secunia.com/advisories/39096
securitytracker.com/id?1023532
www.securityfocus.com/archive/1/509327/100/0/threaded
www.securityfocus.com/bid/38047
www.vupen.com/english/advisories/2010/0289
issues.asterisk.org/view.php?id=16517
issues.asterisk.org/view.php?id=16634
issues.asterisk.org/view.php?id=16724