CVE-2011-4598
15.12.2011, 03:57
The handle_request_info function in channels/chan_sip.c in Asterisk Open Source 1.6.2.x before 1.6.2.21 and 1.8.x before 1.8.7.2, when automon is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted sequence of SIP requests.Enginsight
Vendor | Product | Version |
---|---|---|
digium | asterisk | 1.8.0 |
digium | asterisk | 1.8.0:beta1 |
digium | asterisk | 1.8.0:beta2 |
digium | asterisk | 1.8.0:beta3 |
digium | asterisk | 1.8.0:beta4 |
digium | asterisk | 1.8.0:beta5 |
digium | asterisk | 1.8.0:rc2 |
digium | asterisk | 1.8.0:rc3 |
digium | asterisk | 1.8.0:rc4 |
digium | asterisk | 1.8.0:rc5 |
digium | asterisk | 1.8.1 |
digium | asterisk | 1.8.1:rc1 |
digium | asterisk | 1.8.1.1 |
digium | asterisk | 1.8.1.2 |
digium | asterisk | 1.8.2 |
digium | asterisk | 1.8.2.1 |
digium | asterisk | 1.8.2.2 |
digium | asterisk | 1.8.2.3 |
digium | asterisk | 1.8.2.4 |
digium | asterisk | 1.8.3 |
digium | asterisk | 1.8.3:rc1 |
digium | asterisk | 1.8.3:rc2 |
digium | asterisk | 1.8.3:rc3 |
digium | asterisk | 1.8.3.1 |
digium | asterisk | 1.8.3.2 |
digium | asterisk | 1.8.3.3 |
digium | asterisk | 1.8.4 |
digium | asterisk | 1.8.4:rc1 |
digium | asterisk | 1.8.4:rc2 |
digium | asterisk | 1.8.4:rc3 |
digium | asterisk | 1.8.4.1 |
digium | asterisk | 1.8.4.2 |
digium | asterisk | 1.8.4.3 |
digium | asterisk | 1.8.4.4 |
digium | asterisk | 1.8.5 |
digium | asterisk | 1.8.5:rc1 |
digium | asterisk | 1.8.5.0 |
digium | asterisk | 1.8.6.0 |
digium | asterisk | 1.8.6.0:rc1 |
digium | asterisk | 1.8.6.0:rc2 |
digium | asterisk | 1.8.6.0:rc3 |
digium | asterisk | 1.8.7.0 |
digium | asterisk | 1.8.7.0:rc1 |
digium | asterisk | 1.8.7.0:rc2 |
digium | asterisk | 1.8.7.1 |
digium | asterisk | 1.6.2.0 |
digium | asterisk | 1.6.2.0:rc2 |
digium | asterisk | 1.6.2.0:rc3 |
digium | asterisk | 1.6.2.0:rc4 |
digium | asterisk | 1.6.2.0:rc5 |
digium | asterisk | 1.6.2.0:rc6 |
digium | asterisk | 1.6.2.0:rc7 |
digium | asterisk | 1.6.2.0:rc8 |
digium | asterisk | 1.6.2.1 |
digium | asterisk | 1.6.2.1:rc1 |
digium | asterisk | 1.6.2.2 |
digium | asterisk | 1.6.2.3:rc2 |
digium | asterisk | 1.6.2.4 |
digium | asterisk | 1.6.2.5 |
digium | asterisk | 1.6.2.6 |
digium | asterisk | 1.6.2.6:rc1 |
digium | asterisk | 1.6.2.6:rc2 |
digium | asterisk | 1.6.2.15:rc1 |
digium | asterisk | 1.6.2.16 |
digium | asterisk | 1.6.2.16:rc1 |
digium | asterisk | 1.6.2.16.1 |
digium | asterisk | 1.6.2.16.2 |
digium | asterisk | 1.6.2.17 |
digium | asterisk | 1.6.2.17:rc1 |
digium | asterisk | 1.6.2.17:rc2 |
digium | asterisk | 1.6.2.17:rc3 |
digium | asterisk | 1.6.2.17.1 |
digium | asterisk | 1.6.2.17.2 |
digium | asterisk | 1.6.2.17.3 |
digium | asterisk | 1.6.2.18 |
digium | asterisk | 1.6.2.18:rc1 |
digium | asterisk | 1.6.2.19 |
digium | asterisk | 1.6.2.19:rc1 |
digium | asterisk | 1.6.2.20 |
digium | asterisk | 1.6.2.21 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References