ID CVE-2014-4045
Summary The Publish/Subscribe Framework in the PJSIP channel driver in Asterisk Open Source 12.x before 12.3.1, when sub_min_expiry is set to zero, allows remote attackers to cause a denial of service (assertion failure and crash) via an unsubscribe request when not subscribed to the device.
References
Vulnerable Configurations
  • cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:12.1.0:-:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:12.1.0:-:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:12.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:12.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:12.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:12.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:12.2.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:12.2.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:12.2.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:12.2.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:12.2.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:12.2.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:12.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:12.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:12.3.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:12.3.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:12.3.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:12.3.0:rc2:*:*:*:*:*:*
CVSS
Base: 4.3 (as of 09-10-2018 - 19:47)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:N/A:P
refmap via4
bugtraq 20140612 AST-2014-005: Remote Crash in PJSIP Channel Driver's Publish/Subscribe Framework
confirm http://downloads.asterisk.org/pub/security/AST-2014-005.html
misc http://packetstormsecurity.com/files/127087/Asterisk-Project-Security-Advisory-AST-2014-005.html
Last major update 09-10-2018 - 19:47
Published 17-06-2014 - 14:55
Last modified 09-10-2018 - 19:47
Back to Top