CVE-2016-7551Asterisk vulnerability

CWE-3997 documents5 sources
Severity
7.5HIGHNVD
EPSS
6.6%
top 8.78%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 17
Latest updateMay 17

Description

chain_sip in Asterisk Open Source 11.x before 11.23.1 and 13.x 13.11.1 and Certified Asterisk 11.6 before 11.6-cert15 and 13.8 before 13.8-cert3 allows remote attackers to cause a denial of service (port exhaustion).

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

NVDdigium/certified_asterisk4 versions+3
debiandebian/asterisk< asterisk 1:13.11.2~dfsg-1 (bullseye)
Debiandigium/asterisk< 1:13.11.2~dfsg-1
NVDdigium/asterisk66 versions+65

Also affects: Debian Linux 8.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-254r-9226-v29v: chain_sip in Asterisk Open Source 112022-05-17
OSV
CVE-2016-7551: chain_sip in Asterisk Open Source 112017-04-17

📋Vendor Advisories

1
Debian
CVE-2016-7551: asterisk - chain_sip in Asterisk Open Source 11.x before 11.23.1 and 13.x 13.11.1 and Certi...2016

💬Community

3
Bugzilla
CVE-2016-7551 asterisk: RTP Resource Exhaustion2016-09-09
Bugzilla
CVE-2016-7551 asterisk: RTP Resource Exhaustion [epel-6]2016-09-09
Bugzilla
CVE-2016-7551 asterisk: RTP Resource Exhaustion [fedora-all]2016-09-09
CVE-2016-7551 — Debian Asterisk vulnerability | cvebase