CVE-2013-5642

The SIP channel driver (channels/chan_sip.c) in Asterisk Open Source 1.8.x before 1.8.23.1, 10.x before 10.12.3, and 11.x before 11.5.1; Certified Asterisk 1.8.15 before 1.8.15-cert3 and 11.2 before 11.2-cert2; and Asterisk Digiumphones 10.x-digiumphones before 10.12.3-digiumphones allows remote attackers to cause a denial of service (NULL pointer dereference, segmentation fault, and daemon crash) via an invalid SDP that defines a media description before the connection description in a SIP request.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:digium:asterisk:1.8.17.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.17.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.17.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.17.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.18.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.18.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.18.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.19.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.19.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.19.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.19.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.20.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.20.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.20.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.21.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.21.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.22.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.22.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.22.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.23.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.23.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.23.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:10.10.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:10.10.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:10.10.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:10.11.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:10.11.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:10.11.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:10.11.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:10.12.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:10.12.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:10.12.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:10.12.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:10.12.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.0.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.0.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.1.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.1.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.3.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.3.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.4.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.4.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.4.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.4.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.5.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.5.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.5.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk_digiumphones:10.0.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk_digiumphones:10.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk_digiumphones:10.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk_digiumphones:10.11.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk_digiumphones:10.11.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk_digiumphones:10.11.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk_digiumphones:10.11.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk_digiumphones:10.12.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk_digiumphones:10.12.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk_digiumphones:10.12.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk_digiumphones:10.12.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk_digiumphones:10.12.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:1.8.15:*:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1-rc1:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1-rc2:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1-rc3:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:1.8.15:cert2:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:1.8.15:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:11.2.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:11.2.0:cert1:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:11.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:11.2.0:rc2:*:*:*:*:*:*

History

No history.

Information

Published : 2013-09-09 17:55

Updated : 2024-02-04 18:16


NVD link : CVE-2013-5642

Mitre link : CVE-2013-5642

CVE.ORG link : CVE-2013-5642


JSON object : View

Products Affected

digium

  • certified_asterisk
  • asterisk_digiumphones
  • asterisk
CWE
CWE-20

Improper Input Validation