CVE-2014-2287 — Improper Input Validation in Asterisk
Severity
3.5LOWNVD
EPSS
5.2%
top 10.05%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 18
Latest updateMay 17
Description
channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.26.1, 11.8.x before 11.8.1, and 12.1.x before 12.1.1, and Certified Asterisk 1.8.15 before 1.8.15-cert5 and 11.6 before 11.6-cert2, when chan_sip has a certain configuration, allows remote authenticated users to cause a denial of service (channel and file descriptor consumption) via an INVITE request with a (1) Session-Expires or (2) Min-SE header with a malformed or invalid value.
CVSS vector
AV:N/AC:M/C:N/I:N/A:PExploitability: 6.8 | Impact: 2.9
Affected Packages4 packages
Also affects: Fedora 19, 20
Patches
🔴Vulnerability Details
2📋Vendor Advisories
1Debian▶
CVE-2014-2287: asterisk - channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.26.1, 11.8.x before...↗2014