CVE-2014-8415Improper Input Validation in Asterisk

Severity
5.0MEDIUMNVD
EPSS
0.9%
top 24.16%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 24
Latest updateMay 14

Description

Race condition in the chan_pjsip channel driver in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1 allows remote attackers to cause a denial of service (assertion failure and crash) via a cancel request for a SIP session with a queued action to (1) answer a session or (2) send ringing.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages3 packages

NVDdigium/asterisk12.0.012.7.1+1
debiandebian/asterisk< asterisk 1:13.1.0~dfsg-1 (bullseye)
Debiandigium/asterisk< 1:13.1.0~dfsg-1

🔴Vulnerability Details

2
GHSA
GHSA-g56f-mq6j-ppcx: Race condition in the chan_pjsip channel driver in Asterisk Open Source 122022-05-14
OSV
CVE-2014-8415: Race condition in the chan_pjsip channel driver in Asterisk Open Source 122014-11-24

📋Vendor Advisories

1
Debian
CVE-2014-8415: asterisk - Race condition in the chan_pjsip channel driver in Asterisk Open Source 12.x bef...2014

💬Community

1
Bugzilla
CVE-2014-8415 asterisk: Race condition in the chan_pjsip channel driver leads to DoS2019-08-05