CVE-2011-2529Improper Restriction of Operations within the Bounds of a Memory Buffer in Asterisk

Severity
5.0MEDIUMNVD
EPSS
3.4%
top 12.63%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 6
Latest updateMay 17

Description

chan_sip.c in the SIP channel driver in Asterisk Open Source 1.6.x before 1.6.2.18.1 and 1.8.x before 1.8.4.3 does not properly handle '\0' characters in SIP packets, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted packet.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages3 packages

debiandebian/asterisk< asterisk 1:1.8.4.3-1 (bullseye)
Debiandigium/asterisk< 1:1.8.4.3-1
NVDdigium/asterisk85 versions+84

Patches

🔴Vulnerability Details

2
GHSA
GHSA-xrm7-6c5j-p27r: chan_sip2022-05-17
OSV
CVE-2011-2529: chan_sip2011-07-06

📋Vendor Advisories

1
Debian
CVE-2011-2529: asterisk - chan_sip.c in the SIP channel driver in Asterisk Open Source 1.6.x before 1.6.2....2011