Improper Input Validation Affecting asterisk package, versions [,1.8.15)[1.8.26.0,1.8.26.1)[11.0,11.6)[11.8.0,11.8.1)[12.1.0,12.1.1)


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
73.69% (99th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-ASTERISK-2371618
  • published26 Jan 2022
  • disclosed18 Apr 2014
  • creditUnknown

Introduced: 18 Apr 2014

CVE-2014-2287  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

Upgrade asterisk to version 1.8.15, 1.8.26.1, 11.6, 11.8.1, 12.1.1 or higher.

Overview

Affected versions of this package are vulnerable to Improper Input Validation channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.26.1, 11.8.x before 11.8.1, and 12.1.x before 12.1.1, and Certified Asterisk 1.8.15 before 1.8.15-cert5 and 11.6 before 11.6-cert2, when chan_sip has a certain configuration, allows remote authenticated users to cause a denial of service (channel and file descriptor consumption) via an INVITE request with a (1) Session-Expires or (2) Min-SE header with a malformed or invalid value.

CVSS Scores

version 3.1