Search criteria
6 vulnerabilities found for asteriske by digium
FKIE_CVE-2012-3812
Vulnerability from fkie_nvd - Published: 2012-07-09 22:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Double free vulnerability in apps/app_voicemail.c in Asterisk Open Source 1.8.x before 1.8.13.1 and 10.x before 10.5.2, Certified Asterisk 1.8.11-certx before 1.8.11-cert4, and Asterisk Digiumphones 10.x.x-digiumphones before 10.5.2-digiumphones allows remote authenticated users to cause a denial of service (daemon crash) by establishing multiple voicemail sessions and accessing both the Urgent mailbox and the INBOX mailbox.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F6344E43-E8AA-4340-B3A7-72F5D6A5D184",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "4C170C1C-909D-4439-91B5-DB1A9CD150C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "EE821BE5-B1D3-4854-A700-3A83E5F15724",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "149C57CA-0B4B-4220-87FC-432418D1C393",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "035595D5-BBEC-4D85-AD7A-A2C932D2BA70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "6DAF5655-F09F-47F8-AFA6-4B95F77A57F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "F8E001D8-0A7B-4FDD-88E3-E124ED32B81C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "9D5CFFBD-785F-4417-A54A-F3565FD6E736",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*",
"matchCriteriaId": "D30EF999-92D1-4B19-8E32-1E4B35DE4EA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*",
"matchCriteriaId": "A67D156B-9C43-444F-ADEC-B21D99D1433C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "893EB152-6444-43DB-8714-9735354C873A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "F8447EE7-A834-41D7-9204-07BD3752870C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3C04F2C9-5672-42F2-B664-A3EE4C954C29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "33465668-4C91-4619-960A-D26D77853E53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD08674-0B44-44EA-940B-6812E2D5077D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EEE87710-A129-43AA-BA08-8001848975FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8F582C6E-5DA0-4D72-A40E-66BDBC5CF2B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2E7CEBB8-01B3-4A05-AFE8-37A143C9833E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "522733A7-E89E-4BFD-AC93-D6882636E880",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2FAC47DD-B613-43E4-B9BF-6120B81D9789",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*",
"matchCriteriaId": "86D20CB5-60E8-405E-B387-CF80C7DA5E07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*",
"matchCriteriaId": "71AB5A01-5961-4053-9111-CF32C6473A00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*",
"matchCriteriaId": "77D8E1DC-041F-4B87-AF9A-E0EC4D6A4BD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7CCCB892-30CE-4BEF-904E-5D957F94D0EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F156798F-F2EF-4366-B17E-03165AB437D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9EFBB9A6-DD1D-436E-919F-74A3E4F40396",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "054E34C8-B6A5-48C7-938E-D3C268E0E8BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "1DCECA72-533A-4A95-AB19-20C5F09A1B01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*",
"matchCriteriaId": "0E2309F8-AFEE-4150-99D1-BA606432ED73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*",
"matchCriteriaId": "7785F282-BFA0-400A-8398-872ACCA4BF37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1278D3FB-78C6-4F7D-A845-0A93D4F6E2B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C00A6EFB-A848-46D3-AAD7-FD8140007E42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CB6E3972-5C53-4B6D-BFE1-67E1122EA013",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "048617A0-A783-4519-A947-35220D4CD786",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "DD493A41-E686-444C-A34E-412804510F77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*",
"matchCriteriaId": "87D25FD6-CC3A-4AB0-B7B1-67D07386F99D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3C402E9E-09CC-4EFA-AC27-156437B05B22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C8A41F9C-D2F4-47A9-80CD-2B1BF6B0CB63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "627FF5B9-E5A8-4DBC-A891-B175011E72A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "6146EB2E-BA32-4408-B10B-A711EC39C580",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "1C863324-05AE-4FCA-BD2E-39040A468DCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A85F51E7-0AAE-4F3B-9F90-BD2E31255822",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "315FB0D4-D4A4-4369-BFB8-F2CAEB429015",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "DC74D6C5-F410-4B68-AF92-056B727193A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B70911F8-A526-4600-8198-03FF4CCB28DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BA60A9C9-C2EF-4971-BEFB-FF687DAEF2F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "BAFB22FA-CC24-4AFE-AC83-2D044563F7CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "00F3EB0D-7C63-46B5-BA95-8486B9716C78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "00C1BF3B-7593-478D-9AAA-153901C70286",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc5:*:*:*:*:*:*",
"matchCriteriaId": "5F86406A-0936-4A06-88FB-4137A64498EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "672CE4C0-EBD6-470B-937E-810FF1C4CDBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "88DB1105-74D8-4312-9D02-D1E21F2E785C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "404C0557-6229-4D90-BFDD-54AFFCCE6A19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "6D1D26CC-891F-4396-B7D7-30D712829E71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "F25B61EA-F4D1-452A-9D96-B8DFDD719B0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "9324AB96-EC99-4F04-A0A9-00F936C86EFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BDB6BBCA-47CE-49B8-9706-AFDE4BE46550",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8BFF65E2-692B-4C39-88FC-6DED8D9A7258",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8E8AE686-B618-4B0D-BD27-1F96295E964D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "E9751C0A-84F5-4A43-8282-12A9DE559569",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F67E2694-F6F1-482C-91F2-D9FD856EA31B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5E2D53AA-8D50-445F-9500-2F580F260DC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8880AE7C-3E44-4B76-B500-E93868D4CF5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7C94269D-A271-42AC-A44C-102C814E564B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "E7E5B826-D3D5-4D2D-BB4D-2C1BEDE92456",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asteriske:1.8.8.0:rc4:*:*:*:*:*:*",
"matchCriteriaId": "5B9023E8-DB6F-4DE2-BB1E-D941BE279477",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asteriske:1.8.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DF6135C4-7930-4DD5-80CD-4DC7F53956D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert:*:*:*:*:*:*",
"matchCriteriaId": "C63C46CC-02E2-40AF-8281-F2FB5D89823A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert1:*:*:*:*:*:*",
"matchCriteriaId": "71BAF2A7-024D-475A-88C0-0F5ADE3CA286",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "687ED3CE-67C4-410D-8AF4-C769015598F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "30E918CD-89C4-42DA-9709-E50E0A3FA736",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "DA57FA15-D0D7-4A97-9C25-6F6566940098",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A1C45300-A2CF-40E7-AB67-23DC24C31A1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "958081DC-1D77-45CD-A940-C7A1AB42C7BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "298A879D-4F65-4523-A752-D17C4F81B822",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "37AB07BE-54C4-4972-A05F-D1E2CF4363CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EBC63564-A84E-463D-8312-DDF1C6B7796F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "62A0906E-B631-4F3A-9ABC-9A43A43220BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C6314ADA-2849-416D-966E-C01C322EF904",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8B6CB1DD-614A-4B3D-99AE-9B1341427024",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CC95B04F-3746-4F1C-8428-A1FA10253E14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "20819080-E0AB-4879-B4CF-A154D6F7EF6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C6C45753-E2CC-4F7C-B8DA-3D8CF255EA22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "5A080197-D6AA-4FDC-888E-51D1C8251E34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "1F08D930-D4C1-4C63-875C-171C46AE97C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "1AA43D7D-AEAD-47CB-BFA5-B73004A1A7A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc4:*:*:*:*:*:*",
"matchCriteriaId": "B5ED5F6F-166D-4610-8939-A33AD45F1ADE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1D40002A-564E-425C-BA2A-7C4A8F8DAFD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "521C4DB2-7127-4BA9-94FC-AB0E9E06FE2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "8C905DC1-8AB8-4D83-BB5B-FA4DABC58229",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "ECC74B5D-97A1-46FF-AFA3-5D5E4A0BF3A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F2D98C7C-94A8-4348-AF22-04A41FB6F8EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "85D39A99-E9A6-4860-BC61-56CA2FC3238B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "845DA0A4-1983-4E82-99C8-B7FBF47C632E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "5A63FBB7-F1CF-4603-848F-980742D2ED36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "10B2084F-3AF4-4008-899C-6C1E43715201",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "217C13A5-9F8A-4392-858F-2FC88B03EB0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6B282462-900C-492E-98DE-65364E62F5E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "687784F0-9ACC-435D-81F9-1E1B0F61010C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "9D7D020C-FE32-408B-BE37-58835FD3D95F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "39B7938F-7370-4F67-B0CD-1C14DE2E4E7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AC587195-5973-423B-8BF9-3E0B27363B76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert:*:*:*:*:*:*",
"matchCriteriaId": "C63C46CC-02E2-40AF-8281-F2FB5D89823A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert1:*:*:*:*:*:*",
"matchCriteriaId": "71BAF2A7-024D-475A-88C0-0F5ADE3CA286",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert2:*:*:*:*:*:*",
"matchCriteriaId": "82F91FE8-C320-466B-AF08-67319A00A2BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert3:*:*:*:*:*:*",
"matchCriteriaId": "DCFF0E1C-B455-4C18-8AA1-10408234327B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.0:*:digiumphones:*:*:*:*:*",
"matchCriteriaId": "6372EEEA-2759-4B6A-BD03-D84DC956E80E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta1:digiumphones:*:*:*:*:*",
"matchCriteriaId": "26DF0C53-9F6A-4233-B163-AEC1F9886387",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta2:digiumphones:*:*:*:*:*",
"matchCriteriaId": "79A063D7-553F-486F-9079-D95C8047B05E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc1:digiumphones:*:*:*:*:*",
"matchCriteriaId": "B606D854-FC06-4314-AD24-FEEA3796A0AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc2:digiumphones:*:*:*:*:*",
"matchCriteriaId": "DEBB0786-D912-48D1-BC63-E0F87E078154",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc3:digiumphones:*:*:*:*:*",
"matchCriteriaId": "1C39DD70-1220-4CC6-95B4-CE18CA5787CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.1.0:*:digiumphones:*:*:*:*:*",
"matchCriteriaId": "B0005F0B-9C87-4160-9416-A7C136FCD5AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc1:digiumphones:*:*:*:*:*",
"matchCriteriaId": "12073B6A-14B1-490B-B267-A68194C68BDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc2:digiumphones:*:*:*:*:*",
"matchCriteriaId": "198C92F2-8268-4045-B297-17E0D1F9726E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.2.0:*:digiumphones:*:*:*:*:*",
"matchCriteriaId": "5D3A3C00-EA83-4EF4-8681-DB5616132607",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc1:digiumphones:*:*:*:*:*",
"matchCriteriaId": "5FE59F0F-44B0-4940-8368-F360EE610114",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc2:digiumphones:*:*:*:*:*",
"matchCriteriaId": "3647F0E3-196F-486B-9BAB-75ED24A055ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc3:digiumphones:*:*:*:*:*",
"matchCriteriaId": "1FBC4A5F-FB16-42B2-9689-25F8B3D0F521",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc4:digiumphones:*:*:*:*:*",
"matchCriteriaId": "B788D6E2-78E8-4DE1-81F5-40D52263E7F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.3.0:*:digiumphones:*:*:*:*:*",
"matchCriteriaId": "51358F60-4D6C-4DBA-86B0-E12C48A67456",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc2:digiumphones:*:*:*:*:*",
"matchCriteriaId": "D51C9952-97F4-4326-8F7D-34579D3686AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc3:digiumphones:*:*:*:*:*",
"matchCriteriaId": "3711A75C-AF87-4A5C-8B35-1CF834C12D2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.4.0:*:digiumphones:*:*:*:*:*",
"matchCriteriaId": "E7FFD09D-21A3-4E98-B1FA-C7A16C243D91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc1:digiumphones:*:*:*:*:*",
"matchCriteriaId": "FAC6591A-BC5A-4CA9-90BC-0B686F74127B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc2:digiumphones:*:*:*:*:*",
"matchCriteriaId": "01BAF29D-8679-40F3-AB6C-DA5C3787271C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.5.0:*:digiumphones:*:*:*:*:*",
"matchCriteriaId": "B42229C3-B18E-4D50-9B98-202CB1805CE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc1:digiumphones:*:*:*:*:*",
"matchCriteriaId": "15DF192B-A8D5-4FCC-B469-505A8FA11D00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc2:digiumphones:*:*:*:*:*",
"matchCriteriaId": "D24E01F7-604D-4D05-B698-3BDEF7B69EF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.5.1:*:digiumphones:*:*:*:*:*",
"matchCriteriaId": "A54A74F4-8A6C-4090-88C2-8AB5A606C59B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Double free vulnerability in apps/app_voicemail.c in Asterisk Open Source 1.8.x before 1.8.13.1 and 10.x before 10.5.2, Certified Asterisk 1.8.11-certx before 1.8.11-cert4, and Asterisk Digiumphones 10.x.x-digiumphones before 10.5.2-digiumphones allows remote authenticated users to cause a denial of service (daemon crash) by establishing multiple voicemail sessions and accessing both the Urgent mailbox and the INBOX mailbox."
},
{
"lang": "es",
"value": "vulnerabilidad de doble liberaci\u00f3n en apps/app_voicemail.c en Asterisk Open Source v1.8.x anteriores v1.8.13.1 y v10.x anteriores a v10.5.2, Certified Asterisk v1.8.11-certx anteriores a v1.8.11-cert4, y Asterisk Digiumphones v10.x.x-digiumphones anteriores a v10.5.2-digiumphones permite a usuarios autenticados remotos a provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio) debido al establecimiento de m\u00faltiples sesiones correo de voz y accediendo a buz\u00f3n urgente (Urgent) a trav\u00e9s del buz\u00f3n de entrada INBOX."
}
],
"id": "CVE-2012-3812",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-07-09T22:55:01.260",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://downloads.asterisk.org/pub/security/AST-2012-011.html"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/50687"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/50756"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2012/dsa-2550"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/54317"
},
{
"source": "cve@mitre.org",
"url": "https://issues.asterisk.org/jira/browse/ASTERISK-20052"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://downloads.asterisk.org/pub/security/AST-2012-011.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/50687"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/50756"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2012/dsa-2550"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/54317"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://issues.asterisk.org/jira/browse/ASTERISK-20052"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2012-3863
Vulnerability from fkie_nvd - Published: 2012-07-09 10:20 - Updated: 2025-04-11 00:51
Severity ?
Summary
channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.13.1 and 10.x before 10.5.2, Asterisk Business Edition C.3.x before C.3.7.5, Certified Asterisk 1.8.11-certx before 1.8.11-cert4, and Asterisk Digiumphones 10.x.x-digiumphones before 10.5.2-digiumphones does not properly handle a provisional response to a SIP reINVITE request, which allows remote authenticated users to cause a denial of service (RTP port exhaustion) via sessions that lack final responses.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:digium:asterisk_business_edition:c.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C7E50F92-00C1-4908-AA34-03F0C8B47DA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk_business_edition:c.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "49842130-C25E-43F6-9EC0-A7018AD915B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk_business_edition:c.3.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "1F830CEB-2B0B-4713-8C26-9FADE6C47673",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F6344E43-E8AA-4340-B3A7-72F5D6A5D184",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "4C170C1C-909D-4439-91B5-DB1A9CD150C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "EE821BE5-B1D3-4854-A700-3A83E5F15724",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "149C57CA-0B4B-4220-87FC-432418D1C393",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "035595D5-BBEC-4D85-AD7A-A2C932D2BA70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "6DAF5655-F09F-47F8-AFA6-4B95F77A57F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "F8E001D8-0A7B-4FDD-88E3-E124ED32B81C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "9D5CFFBD-785F-4417-A54A-F3565FD6E736",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*",
"matchCriteriaId": "D30EF999-92D1-4B19-8E32-1E4B35DE4EA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*",
"matchCriteriaId": "A67D156B-9C43-444F-ADEC-B21D99D1433C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "893EB152-6444-43DB-8714-9735354C873A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "F8447EE7-A834-41D7-9204-07BD3752870C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3C04F2C9-5672-42F2-B664-A3EE4C954C29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "33465668-4C91-4619-960A-D26D77853E53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD08674-0B44-44EA-940B-6812E2D5077D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EEE87710-A129-43AA-BA08-8001848975FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8F582C6E-5DA0-4D72-A40E-66BDBC5CF2B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2E7CEBB8-01B3-4A05-AFE8-37A143C9833E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "522733A7-E89E-4BFD-AC93-D6882636E880",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2FAC47DD-B613-43E4-B9BF-6120B81D9789",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*",
"matchCriteriaId": "86D20CB5-60E8-405E-B387-CF80C7DA5E07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*",
"matchCriteriaId": "71AB5A01-5961-4053-9111-CF32C6473A00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*",
"matchCriteriaId": "77D8E1DC-041F-4B87-AF9A-E0EC4D6A4BD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7CCCB892-30CE-4BEF-904E-5D957F94D0EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F156798F-F2EF-4366-B17E-03165AB437D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9EFBB9A6-DD1D-436E-919F-74A3E4F40396",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "054E34C8-B6A5-48C7-938E-D3C268E0E8BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "1DCECA72-533A-4A95-AB19-20C5F09A1B01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*",
"matchCriteriaId": "0E2309F8-AFEE-4150-99D1-BA606432ED73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*",
"matchCriteriaId": "7785F282-BFA0-400A-8398-872ACCA4BF37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1278D3FB-78C6-4F7D-A845-0A93D4F6E2B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C00A6EFB-A848-46D3-AAD7-FD8140007E42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CB6E3972-5C53-4B6D-BFE1-67E1122EA013",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "048617A0-A783-4519-A947-35220D4CD786",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "DD493A41-E686-444C-A34E-412804510F77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*",
"matchCriteriaId": "87D25FD6-CC3A-4AB0-B7B1-67D07386F99D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3C402E9E-09CC-4EFA-AC27-156437B05B22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C8A41F9C-D2F4-47A9-80CD-2B1BF6B0CB63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "627FF5B9-E5A8-4DBC-A891-B175011E72A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "6146EB2E-BA32-4408-B10B-A711EC39C580",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "1C863324-05AE-4FCA-BD2E-39040A468DCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A85F51E7-0AAE-4F3B-9F90-BD2E31255822",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "315FB0D4-D4A4-4369-BFB8-F2CAEB429015",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "DC74D6C5-F410-4B68-AF92-056B727193A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B70911F8-A526-4600-8198-03FF4CCB28DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BA60A9C9-C2EF-4971-BEFB-FF687DAEF2F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "BAFB22FA-CC24-4AFE-AC83-2D044563F7CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "00F3EB0D-7C63-46B5-BA95-8486B9716C78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "00C1BF3B-7593-478D-9AAA-153901C70286",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc5:*:*:*:*:*:*",
"matchCriteriaId": "5F86406A-0936-4A06-88FB-4137A64498EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "672CE4C0-EBD6-470B-937E-810FF1C4CDBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "88DB1105-74D8-4312-9D02-D1E21F2E785C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "404C0557-6229-4D90-BFDD-54AFFCCE6A19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "6D1D26CC-891F-4396-B7D7-30D712829E71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "F25B61EA-F4D1-452A-9D96-B8DFDD719B0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "9324AB96-EC99-4F04-A0A9-00F936C86EFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BDB6BBCA-47CE-49B8-9706-AFDE4BE46550",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8BFF65E2-692B-4C39-88FC-6DED8D9A7258",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8E8AE686-B618-4B0D-BD27-1F96295E964D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "E9751C0A-84F5-4A43-8282-12A9DE559569",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F67E2694-F6F1-482C-91F2-D9FD856EA31B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5E2D53AA-8D50-445F-9500-2F580F260DC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8880AE7C-3E44-4B76-B500-E93868D4CF5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7C94269D-A271-42AC-A44C-102C814E564B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "E7E5B826-D3D5-4D2D-BB4D-2C1BEDE92456",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asteriske:1.8.8.0:rc4:*:*:*:*:*:*",
"matchCriteriaId": "5B9023E8-DB6F-4DE2-BB1E-D941BE279477",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asteriske:1.8.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DF6135C4-7930-4DD5-80CD-4DC7F53956D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert:*:*:*:*:*:*",
"matchCriteriaId": "C63C46CC-02E2-40AF-8281-F2FB5D89823A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert1:*:*:*:*:*:*",
"matchCriteriaId": "71BAF2A7-024D-475A-88C0-0F5ADE3CA286",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.0:*:digiumphones:*:*:*:*:*",
"matchCriteriaId": "6372EEEA-2759-4B6A-BD03-D84DC956E80E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta1:digiumphones:*:*:*:*:*",
"matchCriteriaId": "26DF0C53-9F6A-4233-B163-AEC1F9886387",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta2:digiumphones:*:*:*:*:*",
"matchCriteriaId": "79A063D7-553F-486F-9079-D95C8047B05E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc1:digiumphones:*:*:*:*:*",
"matchCriteriaId": "B606D854-FC06-4314-AD24-FEEA3796A0AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc2:digiumphones:*:*:*:*:*",
"matchCriteriaId": "DEBB0786-D912-48D1-BC63-E0F87E078154",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc3:digiumphones:*:*:*:*:*",
"matchCriteriaId": "1C39DD70-1220-4CC6-95B4-CE18CA5787CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.1.0:*:digiumphones:*:*:*:*:*",
"matchCriteriaId": "B0005F0B-9C87-4160-9416-A7C136FCD5AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc1:digiumphones:*:*:*:*:*",
"matchCriteriaId": "12073B6A-14B1-490B-B267-A68194C68BDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc2:digiumphones:*:*:*:*:*",
"matchCriteriaId": "198C92F2-8268-4045-B297-17E0D1F9726E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.2.0:*:digiumphones:*:*:*:*:*",
"matchCriteriaId": "5D3A3C00-EA83-4EF4-8681-DB5616132607",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc1:digiumphones:*:*:*:*:*",
"matchCriteriaId": "5FE59F0F-44B0-4940-8368-F360EE610114",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc2:digiumphones:*:*:*:*:*",
"matchCriteriaId": "3647F0E3-196F-486B-9BAB-75ED24A055ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc3:digiumphones:*:*:*:*:*",
"matchCriteriaId": "1FBC4A5F-FB16-42B2-9689-25F8B3D0F521",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc4:digiumphones:*:*:*:*:*",
"matchCriteriaId": "B788D6E2-78E8-4DE1-81F5-40D52263E7F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.3.0:*:digiumphones:*:*:*:*:*",
"matchCriteriaId": "51358F60-4D6C-4DBA-86B0-E12C48A67456",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc2:digiumphones:*:*:*:*:*",
"matchCriteriaId": "D51C9952-97F4-4326-8F7D-34579D3686AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc3:digiumphones:*:*:*:*:*",
"matchCriteriaId": "3711A75C-AF87-4A5C-8B35-1CF834C12D2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.4.0:*:digiumphones:*:*:*:*:*",
"matchCriteriaId": "E7FFD09D-21A3-4E98-B1FA-C7A16C243D91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc1:digiumphones:*:*:*:*:*",
"matchCriteriaId": "FAC6591A-BC5A-4CA9-90BC-0B686F74127B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc2:digiumphones:*:*:*:*:*",
"matchCriteriaId": "01BAF29D-8679-40F3-AB6C-DA5C3787271C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.5.0:*:digiumphones:*:*:*:*:*",
"matchCriteriaId": "B42229C3-B18E-4D50-9B98-202CB1805CE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc1:digiumphones:*:*:*:*:*",
"matchCriteriaId": "15DF192B-A8D5-4FCC-B469-505A8FA11D00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc2:digiumphones:*:*:*:*:*",
"matchCriteriaId": "D24E01F7-604D-4D05-B698-3BDEF7B69EF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.5.1:*:digiumphones:*:*:*:*:*",
"matchCriteriaId": "A54A74F4-8A6C-4090-88C2-8AB5A606C59B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "687ED3CE-67C4-410D-8AF4-C769015598F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "30E918CD-89C4-42DA-9709-E50E0A3FA736",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "DA57FA15-D0D7-4A97-9C25-6F6566940098",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A1C45300-A2CF-40E7-AB67-23DC24C31A1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "958081DC-1D77-45CD-A940-C7A1AB42C7BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "298A879D-4F65-4523-A752-D17C4F81B822",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "37AB07BE-54C4-4972-A05F-D1E2CF4363CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EBC63564-A84E-463D-8312-DDF1C6B7796F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "62A0906E-B631-4F3A-9ABC-9A43A43220BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C6314ADA-2849-416D-966E-C01C322EF904",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8B6CB1DD-614A-4B3D-99AE-9B1341427024",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CC95B04F-3746-4F1C-8428-A1FA10253E14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "20819080-E0AB-4879-B4CF-A154D6F7EF6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C6C45753-E2CC-4F7C-B8DA-3D8CF255EA22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "5A080197-D6AA-4FDC-888E-51D1C8251E34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "1F08D930-D4C1-4C63-875C-171C46AE97C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "1AA43D7D-AEAD-47CB-BFA5-B73004A1A7A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc4:*:*:*:*:*:*",
"matchCriteriaId": "B5ED5F6F-166D-4610-8939-A33AD45F1ADE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1D40002A-564E-425C-BA2A-7C4A8F8DAFD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "521C4DB2-7127-4BA9-94FC-AB0E9E06FE2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "8C905DC1-8AB8-4D83-BB5B-FA4DABC58229",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "ECC74B5D-97A1-46FF-AFA3-5D5E4A0BF3A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F2D98C7C-94A8-4348-AF22-04A41FB6F8EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "85D39A99-E9A6-4860-BC61-56CA2FC3238B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "845DA0A4-1983-4E82-99C8-B7FBF47C632E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "5A63FBB7-F1CF-4603-848F-980742D2ED36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "10B2084F-3AF4-4008-899C-6C1E43715201",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "217C13A5-9F8A-4392-858F-2FC88B03EB0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6B282462-900C-492E-98DE-65364E62F5E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "687784F0-9ACC-435D-81F9-1E1B0F61010C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "9D7D020C-FE32-408B-BE37-58835FD3D95F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "39B7938F-7370-4F67-B0CD-1C14DE2E4E7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AC587195-5973-423B-8BF9-3E0B27363B76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert:*:*:*:*:*:*",
"matchCriteriaId": "C63C46CC-02E2-40AF-8281-F2FB5D89823A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert1:*:*:*:*:*:*",
"matchCriteriaId": "71BAF2A7-024D-475A-88C0-0F5ADE3CA286",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert2:*:*:*:*:*:*",
"matchCriteriaId": "82F91FE8-C320-466B-AF08-67319A00A2BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert3:*:*:*:*:*:*",
"matchCriteriaId": "DCFF0E1C-B455-4C18-8AA1-10408234327B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.13.1 and 10.x before 10.5.2, Asterisk Business Edition C.3.x before C.3.7.5, Certified Asterisk 1.8.11-certx before 1.8.11-cert4, and Asterisk Digiumphones 10.x.x-digiumphones before 10.5.2-digiumphones does not properly handle a provisional response to a SIP reINVITE request, which allows remote authenticated users to cause a denial of service (RTP port exhaustion) via sessions that lack final responses."
},
{
"lang": "es",
"value": "Asterisk Open Source v1.8.x anterior a v1.8.13.1 y v10.x anterior a v10.5.2, Asterisk Business Edition vC.3.x anterior a vC.3.7.5, Certified Asterisk v1.8.11-certx anterior a v1.8.11-cert4, y Asterisk Digiumphones v10.x.x-digiumphones anterior a v10.5.2-digiumphones no maneja una respuesta provisional a una petici\u00f3n SIP reINVITE de forma adecuada, lo que permite a atacantes remotos autenticados provocar una denegaci\u00f3n de servicio (agotamiento de puerto RTP) a trav\u00e9s de sesiones que carecen de repuestas finales."
}
],
"id": "CVE-2012-3863",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-07-09T10:20:44.823",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://downloads.asterisk.org/pub/security/AST-2012-010.html"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/50687"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/50756"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2012/dsa-2550"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/54327"
},
{
"source": "cve@mitre.org",
"url": "https://issues.asterisk.org/jira/browse/ASTERISK-19992"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://downloads.asterisk.org/pub/security/AST-2012-010.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/50687"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/50756"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2012/dsa-2550"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/54327"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://issues.asterisk.org/jira/browse/ASTERISK-19992"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2012-3812 (GCVE-0-2012-3812)
Vulnerability from cvelistv5 – Published: 2012-07-09 22:00 – Updated: 2024-08-06 20:21
VLAI?
Summary
Double free vulnerability in apps/app_voicemail.c in Asterisk Open Source 1.8.x before 1.8.13.1 and 10.x before 10.5.2, Certified Asterisk 1.8.11-certx before 1.8.11-cert4, and Asterisk Digiumphones 10.x.x-digiumphones before 10.5.2-digiumphones allows remote authenticated users to cause a denial of service (daemon crash) by establishing multiple voicemail sessions and accessing both the Urgent mailbox and the INBOX mailbox.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T20:21:02.907Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "50687",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/50687"
},
{
"name": "50756",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/50756"
},
{
"name": "54317",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/54317"
},
{
"name": "DSA-2550",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2012/dsa-2550"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://issues.asterisk.org/jira/browse/ASTERISK-20052"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://downloads.asterisk.org/pub/security/AST-2012-011.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-06-27T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Double free vulnerability in apps/app_voicemail.c in Asterisk Open Source 1.8.x before 1.8.13.1 and 10.x before 10.5.2, Certified Asterisk 1.8.11-certx before 1.8.11-cert4, and Asterisk Digiumphones 10.x.x-digiumphones before 10.5.2-digiumphones allows remote authenticated users to cause a denial of service (daemon crash) by establishing multiple voicemail sessions and accessing both the Urgent mailbox and the INBOX mailbox."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-10-31T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "50687",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/50687"
},
{
"name": "50756",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/50756"
},
{
"name": "54317",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/54317"
},
{
"name": "DSA-2550",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2012/dsa-2550"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://issues.asterisk.org/jira/browse/ASTERISK-20052"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://downloads.asterisk.org/pub/security/AST-2012-011.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-3812",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Double free vulnerability in apps/app_voicemail.c in Asterisk Open Source 1.8.x before 1.8.13.1 and 10.x before 10.5.2, Certified Asterisk 1.8.11-certx before 1.8.11-cert4, and Asterisk Digiumphones 10.x.x-digiumphones before 10.5.2-digiumphones allows remote authenticated users to cause a denial of service (daemon crash) by establishing multiple voicemail sessions and accessing both the Urgent mailbox and the INBOX mailbox."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "50687",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50687"
},
{
"name": "50756",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50756"
},
{
"name": "54317",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/54317"
},
{
"name": "DSA-2550",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2550"
},
{
"name": "https://issues.asterisk.org/jira/browse/ASTERISK-20052",
"refsource": "CONFIRM",
"url": "https://issues.asterisk.org/jira/browse/ASTERISK-20052"
},
{
"name": "http://downloads.asterisk.org/pub/security/AST-2012-011.html",
"refsource": "CONFIRM",
"url": "http://downloads.asterisk.org/pub/security/AST-2012-011.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-3812",
"datePublished": "2012-07-09T22:00:00",
"dateReserved": "2012-06-27T00:00:00",
"dateUpdated": "2024-08-06T20:21:02.907Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-3863 (GCVE-0-2012-3863)
Vulnerability from cvelistv5 – Published: 2012-07-09 10:00 – Updated: 2024-08-06 20:21
VLAI?
Summary
channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.13.1 and 10.x before 10.5.2, Asterisk Business Edition C.3.x before C.3.7.5, Certified Asterisk 1.8.11-certx before 1.8.11-cert4, and Asterisk Digiumphones 10.x.x-digiumphones before 10.5.2-digiumphones does not properly handle a provisional response to a SIP reINVITE request, which allows remote authenticated users to cause a denial of service (RTP port exhaustion) via sessions that lack final responses.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T20:21:03.613Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "50687",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/50687"
},
{
"name": "50756",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/50756"
},
{
"name": "DSA-2550",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2012/dsa-2550"
},
{
"name": "54327",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/54327"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://downloads.asterisk.org/pub/security/AST-2012-010.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://issues.asterisk.org/jira/browse/ASTERISK-19992"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-07-06T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.13.1 and 10.x before 10.5.2, Asterisk Business Edition C.3.x before C.3.7.5, Certified Asterisk 1.8.11-certx before 1.8.11-cert4, and Asterisk Digiumphones 10.x.x-digiumphones before 10.5.2-digiumphones does not properly handle a provisional response to a SIP reINVITE request, which allows remote authenticated users to cause a denial of service (RTP port exhaustion) via sessions that lack final responses."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-07-11T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "50687",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/50687"
},
{
"name": "50756",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/50756"
},
{
"name": "DSA-2550",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2012/dsa-2550"
},
{
"name": "54327",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/54327"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://downloads.asterisk.org/pub/security/AST-2012-010.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://issues.asterisk.org/jira/browse/ASTERISK-19992"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-3863",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.13.1 and 10.x before 10.5.2, Asterisk Business Edition C.3.x before C.3.7.5, Certified Asterisk 1.8.11-certx before 1.8.11-cert4, and Asterisk Digiumphones 10.x.x-digiumphones before 10.5.2-digiumphones does not properly handle a provisional response to a SIP reINVITE request, which allows remote authenticated users to cause a denial of service (RTP port exhaustion) via sessions that lack final responses."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "50687",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50687"
},
{
"name": "50756",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50756"
},
{
"name": "DSA-2550",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2550"
},
{
"name": "54327",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/54327"
},
{
"name": "http://downloads.asterisk.org/pub/security/AST-2012-010.html",
"refsource": "CONFIRM",
"url": "http://downloads.asterisk.org/pub/security/AST-2012-010.html"
},
{
"name": "https://issues.asterisk.org/jira/browse/ASTERISK-19992",
"refsource": "CONFIRM",
"url": "https://issues.asterisk.org/jira/browse/ASTERISK-19992"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-3863",
"datePublished": "2012-07-09T10:00:00",
"dateReserved": "2012-07-06T00:00:00",
"dateUpdated": "2024-08-06T20:21:03.613Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-3812 (GCVE-0-2012-3812)
Vulnerability from nvd – Published: 2012-07-09 22:00 – Updated: 2024-08-06 20:21
VLAI?
Summary
Double free vulnerability in apps/app_voicemail.c in Asterisk Open Source 1.8.x before 1.8.13.1 and 10.x before 10.5.2, Certified Asterisk 1.8.11-certx before 1.8.11-cert4, and Asterisk Digiumphones 10.x.x-digiumphones before 10.5.2-digiumphones allows remote authenticated users to cause a denial of service (daemon crash) by establishing multiple voicemail sessions and accessing both the Urgent mailbox and the INBOX mailbox.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T20:21:02.907Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "50687",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/50687"
},
{
"name": "50756",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/50756"
},
{
"name": "54317",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/54317"
},
{
"name": "DSA-2550",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2012/dsa-2550"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://issues.asterisk.org/jira/browse/ASTERISK-20052"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://downloads.asterisk.org/pub/security/AST-2012-011.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-06-27T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Double free vulnerability in apps/app_voicemail.c in Asterisk Open Source 1.8.x before 1.8.13.1 and 10.x before 10.5.2, Certified Asterisk 1.8.11-certx before 1.8.11-cert4, and Asterisk Digiumphones 10.x.x-digiumphones before 10.5.2-digiumphones allows remote authenticated users to cause a denial of service (daemon crash) by establishing multiple voicemail sessions and accessing both the Urgent mailbox and the INBOX mailbox."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-10-31T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "50687",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/50687"
},
{
"name": "50756",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/50756"
},
{
"name": "54317",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/54317"
},
{
"name": "DSA-2550",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2012/dsa-2550"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://issues.asterisk.org/jira/browse/ASTERISK-20052"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://downloads.asterisk.org/pub/security/AST-2012-011.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-3812",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Double free vulnerability in apps/app_voicemail.c in Asterisk Open Source 1.8.x before 1.8.13.1 and 10.x before 10.5.2, Certified Asterisk 1.8.11-certx before 1.8.11-cert4, and Asterisk Digiumphones 10.x.x-digiumphones before 10.5.2-digiumphones allows remote authenticated users to cause a denial of service (daemon crash) by establishing multiple voicemail sessions and accessing both the Urgent mailbox and the INBOX mailbox."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "50687",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50687"
},
{
"name": "50756",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50756"
},
{
"name": "54317",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/54317"
},
{
"name": "DSA-2550",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2550"
},
{
"name": "https://issues.asterisk.org/jira/browse/ASTERISK-20052",
"refsource": "CONFIRM",
"url": "https://issues.asterisk.org/jira/browse/ASTERISK-20052"
},
{
"name": "http://downloads.asterisk.org/pub/security/AST-2012-011.html",
"refsource": "CONFIRM",
"url": "http://downloads.asterisk.org/pub/security/AST-2012-011.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-3812",
"datePublished": "2012-07-09T22:00:00",
"dateReserved": "2012-06-27T00:00:00",
"dateUpdated": "2024-08-06T20:21:02.907Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-3863 (GCVE-0-2012-3863)
Vulnerability from nvd – Published: 2012-07-09 10:00 – Updated: 2024-08-06 20:21
VLAI?
Summary
channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.13.1 and 10.x before 10.5.2, Asterisk Business Edition C.3.x before C.3.7.5, Certified Asterisk 1.8.11-certx before 1.8.11-cert4, and Asterisk Digiumphones 10.x.x-digiumphones before 10.5.2-digiumphones does not properly handle a provisional response to a SIP reINVITE request, which allows remote authenticated users to cause a denial of service (RTP port exhaustion) via sessions that lack final responses.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T20:21:03.613Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "50687",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/50687"
},
{
"name": "50756",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/50756"
},
{
"name": "DSA-2550",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2012/dsa-2550"
},
{
"name": "54327",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/54327"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://downloads.asterisk.org/pub/security/AST-2012-010.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://issues.asterisk.org/jira/browse/ASTERISK-19992"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-07-06T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.13.1 and 10.x before 10.5.2, Asterisk Business Edition C.3.x before C.3.7.5, Certified Asterisk 1.8.11-certx before 1.8.11-cert4, and Asterisk Digiumphones 10.x.x-digiumphones before 10.5.2-digiumphones does not properly handle a provisional response to a SIP reINVITE request, which allows remote authenticated users to cause a denial of service (RTP port exhaustion) via sessions that lack final responses."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-07-11T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "50687",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/50687"
},
{
"name": "50756",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/50756"
},
{
"name": "DSA-2550",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2012/dsa-2550"
},
{
"name": "54327",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/54327"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://downloads.asterisk.org/pub/security/AST-2012-010.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://issues.asterisk.org/jira/browse/ASTERISK-19992"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-3863",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.13.1 and 10.x before 10.5.2, Asterisk Business Edition C.3.x before C.3.7.5, Certified Asterisk 1.8.11-certx before 1.8.11-cert4, and Asterisk Digiumphones 10.x.x-digiumphones before 10.5.2-digiumphones does not properly handle a provisional response to a SIP reINVITE request, which allows remote authenticated users to cause a denial of service (RTP port exhaustion) via sessions that lack final responses."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "50687",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50687"
},
{
"name": "50756",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50756"
},
{
"name": "DSA-2550",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2550"
},
{
"name": "54327",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/54327"
},
{
"name": "http://downloads.asterisk.org/pub/security/AST-2012-010.html",
"refsource": "CONFIRM",
"url": "http://downloads.asterisk.org/pub/security/AST-2012-010.html"
},
{
"name": "https://issues.asterisk.org/jira/browse/ASTERISK-19992",
"refsource": "CONFIRM",
"url": "https://issues.asterisk.org/jira/browse/ASTERISK-19992"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-3863",
"datePublished": "2012-07-09T10:00:00",
"dateReserved": "2012-07-06T00:00:00",
"dateUpdated": "2024-08-06T20:21:03.613Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}