CVE-2012-0885 — Asterisk vulnerability
7 documents5 sources
Severity
4.3MEDIUMNVD
EPSS
1.1%
top 22.36%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 25
Latest updateMay 17
Description
chan_sip.c in Asterisk Open Source 1.8.x before 1.8.8.2 and 10.x before 10.0.1, when the res_srtp module is used and media support is improperly configured, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted SDP message with a crypto attribute and a (1) video or (2) text media type, as demonstrated by CSipSimple.
CVSS vector
AV:N/AC:M/C:N/I:N/A:PExploitability: 8.6 | Impact: 2.9
Affected Packages2 packages
Patches
🔴Vulnerability Details
2📋Vendor Advisories
1Debian▶
CVE-2012-0885: asterisk - chan_sip.c in Asterisk Open Source 1.8.x before 1.8.8.2 and 10.x before 10.0.1, ...↗2012
💬Community
3Bugzilla▶
CVE-2012-0885 asterisk: Remote DoS while processing crypto line for media stream with non-existing RTP [fedora-all]↗2012-01-20
Bugzilla▶
CVE-2012-0885 asterisk: Remote DoS while processing crypto line for media stream with non-existing RTP↗2012-01-20
Bugzilla▶
CVE-2012-0885 asterisk: Remote DoS while processing crypto line for media stream with non-existing RTP [epel-6]↗2012-01-20