fkie_cve-2013-5642
Vulnerability from fkie_nvd
Published
2013-09-09 17:55
Modified
2024-11-21 01:57
Severity ?
Summary
The SIP channel driver (channels/chan_sip.c) in Asterisk Open Source 1.8.x before 1.8.23.1, 10.x before 10.12.3, and 11.x before 11.5.1; Certified Asterisk 1.8.15 before 1.8.15-cert3 and 11.2 before 11.2-cert2; and Asterisk Digiumphones 10.x-digiumphones before 10.12.3-digiumphones allows remote attackers to cause a denial of service (NULL pointer dereference, segmentation fault, and daemon crash) via an invalid SDP that defines a media description before the connection description in a SIP request.
References
cve@mitre.orghttp://archives.neohapsis.com/archives/bugtraq/2013-08/0174.html
cve@mitre.orghttp://downloads.asterisk.org/pub/security/AST-2013-005.htmlPatch, Vendor Advisory
cve@mitre.orghttp://osvdb.org/96690
cve@mitre.orghttp://secunia.com/advisories/54534Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/54617
cve@mitre.orghttp://www.debian.org/security/2013/dsa-2749
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2013:223
cve@mitre.orghttp://www.securityfocus.com/bid/62022
cve@mitre.orghttp://www.securitytracker.com/id/1028957
cve@mitre.orghttps://issues.asterisk.org/jira/browse/ASTERISK-22007
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/bugtraq/2013-08/0174.html
af854a3a-2127-422b-91ae-364da2661108http://downloads.asterisk.org/pub/security/AST-2013-005.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/96690
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/54534Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/54617
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2013/dsa-2749
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2013:223
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/62022
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1028957
af854a3a-2127-422b-91ae-364da2661108https://issues.asterisk.org/jira/browse/ASTERISK-22007
Impacted products
Vendor Product Version
digium asterisk 1.8.17.0
digium asterisk 1.8.17.0
digium asterisk 1.8.17.0
digium asterisk 1.8.17.0
digium asterisk 1.8.18.0
digium asterisk 1.8.18.0
digium asterisk 1.8.18.1
digium asterisk 1.8.19.0
digium asterisk 1.8.19.0
digium asterisk 1.8.19.0
digium asterisk 1.8.19.1
digium asterisk 1.8.20.0
digium asterisk 1.8.20.0
digium asterisk 1.8.20.0
digium asterisk 1.8.21.0
digium asterisk 1.8.21.0
digium asterisk 1.8.22.0
digium asterisk 1.8.22.0
digium asterisk 1.8.22.0
digium asterisk 1.8.23.0
digium asterisk 1.8.23.0
digium asterisk 1.8.23.0
digium asterisk 10.10.0
digium asterisk 10.10.0
digium asterisk 10.10.0
digium asterisk 10.11.0
digium asterisk 10.11.0
digium asterisk 10.11.0
digium asterisk 10.11.0
digium asterisk 10.12.0
digium asterisk 10.12.0
digium asterisk 10.12.0
digium asterisk 10.12.1
digium asterisk 10.12.2
digium asterisk 11.0.0
digium asterisk 11.0.0
digium asterisk 11.0.0
digium asterisk 11.0.0
digium asterisk 11.0.0
digium asterisk 11.0.1
digium asterisk 11.0.2
digium asterisk 11.1.0
digium asterisk 11.1.0
digium asterisk 11.1.0
digium asterisk 11.1.1
digium asterisk 11.1.2
digium asterisk 11.2.0
digium asterisk 11.2.0
digium asterisk 11.3.0
digium asterisk 11.3.0
digium asterisk 11.4.0
digium asterisk 11.4.0
digium asterisk 11.4.0
digium asterisk 11.4.0
digium asterisk 11.5.0
digium asterisk 11.5.0
digium asterisk 11.5.0
digium asterisk 11.5.1
digium asterisk_digiumphones 10.0.0
digium asterisk_digiumphones 10.0.0
digium asterisk_digiumphones 10.0.0
digium asterisk_digiumphones 10.11.0
digium asterisk_digiumphones 10.11.0
digium asterisk_digiumphones 10.11.0
digium asterisk_digiumphones 10.11.0
digium asterisk_digiumphones 10.12.0
digium asterisk_digiumphones 10.12.0
digium asterisk_digiumphones 10.12.0
digium asterisk_digiumphones 10.12.1
digium asterisk_digiumphones 10.12.2
digium certified_asterisk 1.8.15
digium certified_asterisk 1.8.15
digium certified_asterisk 1.8.15
digium certified_asterisk 1.8.15
digium certified_asterisk 1.8.15
digium certified_asterisk 1.8.15
digium certified_asterisk 1.8.15
digium certified_asterisk 11.2.0
digium certified_asterisk 11.2.0
digium certified_asterisk 11.2.0
digium certified_asterisk 11.2.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F368897-A481-42DD-A8B0-8AD43A5FD68B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "6BA8F4AF-26C0-4A69-B489-16E7A56E5123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FE82D53D-092D-4B36-A979-23E9A5E07A78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "27365383-72DB-4683-9A67-CF553FF2620A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "46EE63D4-CA9C-4DF4-AF85-B8AC2E3F844A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "91407E03-4E98-4DD9-B584-E5BB74F09B9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "669CC22C-45E5-40AB-9A95-D7DFD694B688",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "80A38E0C-45D9-4353-8426-87A4CFA371DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "54A934AE-AB7C-4D10-8BA2-9C54410C648F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "7A7C5A8E-35E6-4B86-8502-1970031AB987",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FA4C14B-A01C-4CFE-8985-317ACCDAD209",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1224686C-8A1E-40E1-ACB9-87F571641EAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "619704FF-2F0C-47E8-A340-58135CEE6B89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "E412E336-871A-4CAC-97E5-FB203BB9349D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.21.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FC1A0E66-63F4-4BD0-8C9A-3D23A116EE08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.21.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "79963FF0-5ED6-41B6-8E60-146BD7879518",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.22.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B63FB1C5-9704-4C6A-8DE6-2283D1993BA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.22.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0787BC7B-9464-4AAA-896B-C028ECF8E397",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.22.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "84C0FBC8-9CD1-4135-94C7-BE90A7C94625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE14D16B-4903-47BD-BCBD-28A8B6B878E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FD3948A1-B5A6-4702-9187-A7720E81B7F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "BC097BB6-02E9-4F48-98CB-B5F31B41009C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0992625B-012F-40EA-9A20-6352E633F62B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.10.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E3828876-DDB4-457D-8E50-43A4FF761005",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.10.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "79283554-AF08-44DC-BF98-446C47AA490A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "54EBFD0B-686F-477F-8FF2-535F24A3348B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.11.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0961F130-FF8C-41C2-BF2E-9731ED9EB73B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.11.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "BE78F4A2-B165-446C-AA1C-7A9E13718C6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.11.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "9789FC49-DE20-4477-B9D5-12CB71F42E58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DD97918-B589-4422-B695-C3C00203A3DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.12.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1E59E84-F3FF-44FF-BC7D-31F3880E32F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.12.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "2D9C7006-F5B1-4171-BB44-182C39DE3AAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8D2B210-3ADA-40AD-A575-DB88A9F71C91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F7C53CD-260C-49F5-BCA4-E1D0A58E0B29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53B8453-F35A-49BE-8129-774BADF71BA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "CCB0C07E-DA2F-4169-848D-C3315CDC1CB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "410C43E6-5912-4C22-A592-7CF94402EEB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D50A355E-1B55-4DD2-8100-EB81AA6FC40E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "9ADF4230-EFEB-45EC-9C96-0262B4A3E459",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5234531C-F69A-4B94-A480-147734206C5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "321C1066-6800-4488-A7C4-BE91FF738453",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9B51588-50A2-40B2-A007-06F57D38C7AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CDE2B00C-6AC0-4166-8A25-EFC42CE7F737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "617FC4AF-D152-4EE1-828D-C2A6AD0DFD3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A3FE6DC-17FD-4CEE-BDFB-9D4685640381",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CEEB6C2-0A6D-4434-8446-CB8605CD3B14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1548C574-CD51-49F6-91B1-B06C504000E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D56C2C11-4B42-43AB-9DAE-61C15D107160",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.3.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "69F2DED4-39F5-44C8-BEA3-22692D28C631",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.3.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "AD172E70-238B-4B01-A922-8021B5627092",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C689A32B-E87D-492F-B3F6-7B80DFA049C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "5FB3863D-7F46-4C4A-9E6B-C255CDF0D953",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7239304D-C383-4F26-BB08-65ADD2380015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "1AC153C2-258E-4EE6-845F-8E8C68AA242D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "229B7982-9775-42AA-B8F5-FE920CCAA497",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.5.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "326845DF-2DB2-406B-BE0F-877384DAACFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.5.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "E0FC2D46-FD1B-421F-8773-BB41B1E9A831",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8788AF7B-CBB6-4D9D-A748-486787935A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB19B2F7-5685-449F-858C-C226D2A373B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D10B9E8C-3B72-490B-A276-A745299DA3C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "E63CF763-0682-4453-8D07-C9253C179486",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FDB7AA1-25A7-4BED-A875-C0494E973EA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.11.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E0BCE319-8C87-4521-BEAA-02F0EF47B315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.11.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "5A2534F0-3DEE-4FCB-B15D-97D1836CE83D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.11.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "D3F38B78-8215-43D6-8C5C-6DB8E6C34F06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE54B76B-4713-4281-AB4B-B17901121B89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.12.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "08EE9963-2A44-48A0-8A1B-919CCE3652FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.12.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "19C7B58B-6591-45B5-B527-50FA0A5BD1A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D3825F-3B95-4056-AF3C-43269734BA2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "806F60DA-FAA1-4C13-889B-0FF518C01E44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6DDE265-B4B9-495A-95F7-0910E8199980",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1:*:*:*:*:*:*",
              "matchCriteriaId": "2365F1EE-16A4-4293-B80E-A51CD6A2F112",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1-rc1:*:*:*:*:*:*",
              "matchCriteriaId": "6B7AE7FB-8170-41AD-9597-07335D36AE48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1-rc2:*:*:*:*:*:*",
              "matchCriteriaId": "9131FB32-E3F0-476C-A0D1-36E2101631D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1-rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5209356B-4A86-4C93-9D04-C66969F23BC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert2:*:*:*:*:*:*",
              "matchCriteriaId": "F087C546-FBCA-4D0D-A023-8F9384CD160C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "9AF5750B-2348-4E35-9F08-27E2385E329F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:11.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0344FE7-952A-4BC5-A31F-F2C5EABDB5FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:11.2.0:cert1:*:*:*:*:*:*",
              "matchCriteriaId": "960521C4-9004-4412-8A38-66240C4B875D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:11.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "00F26342-110F-4163-AD11-98AA3B71D299",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:11.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "8652FA73-2F02-401C-890F-0544276294D3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SIP channel driver (channels/chan_sip.c) in Asterisk Open Source 1.8.x before 1.8.23.1, 10.x before 10.12.3, and 11.x before 11.5.1; Certified Asterisk 1.8.15 before 1.8.15-cert3 and 11.2 before 11.2-cert2; and Asterisk Digiumphones 10.x-digiumphones before 10.12.3-digiumphones allows remote attackers to cause a denial of service (NULL pointer dereference, segmentation fault, and daemon crash) via an invalid SDP that defines a media description before the connection description in a SIP request."
    },
    {
      "lang": "es",
      "value": "El controlador de canal SIP (channels/chan_sip.c) en Asterisk Open Source 1.8.x (anteriores a 1.8.23.1), 10.x (anteriores a 10.12.3), y 11.x (anteriores a 11.5.1); Certified Asterisk 1.8.15 (anteriores a 1.8.15-cert3) y 11.2 (anteriores a 11.2-cert2); y Asterisk Digiumphones 10.x-digiumphones (anteriores a 10.12.3-digiumphones) permiten a un atcante remoto causar una denegaci\u00f3n de servicio (referencia a puntero nulo, corrupci\u00f3n de memoria, y ca\u00edda del demonio) a trav\u00e9s de un SDP inv\u00e1lido que define una descripci\u00f3n de medios antes de la descripci\u00f3n de conexi\u00f3n en una petici\u00f3n SIP."
    }
  ],
  "id": "CVE-2013-5642",
  "lastModified": "2024-11-21T01:57:52.070",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-09-09T17:55:06.267",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2013-08/0174.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://downloads.asterisk.org/pub/security/AST-2013-005.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/96690"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/54534"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/54617"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2013/dsa-2749"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:223"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/62022"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id/1028957"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://issues.asterisk.org/jira/browse/ASTERISK-22007"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2013-08/0174.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://downloads.asterisk.org/pub/security/AST-2013-005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/96690"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/54534"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/54617"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2013/dsa-2749"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:223"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/62022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1028957"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.asterisk.org/jira/browse/ASTERISK-22007"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.