CVE-2014-6609CVE-2014-6609

Affected configuration(s):

cpe:/a:digium:asterisk:12.0.0
cpe:/a:digium:asterisk:12.1.0
cpe:/a:digium:asterisk:12.1.0:rc1
cpe:/a:digium:asterisk:12.1.0:rc2
cpe:/a:digium:asterisk:12.1.0:rc3
cpe:/a:digium:asterisk:12.2.0
cpe:/a:digium:asterisk:12.2.0:rc1
cpe:/a:digium:asterisk:12.2.0:rc2
cpe:/a:digium:asterisk:12.2.0:rc3
cpe:/a:digium:asterisk:12.3.0
cpe:/a:digium:asterisk:12.3.0:rc1
cpe:/a:digium:asterisk:12.3.0:rc2
cpe:/a:digium:asterisk:12.4.0
cpe:/a:digium:asterisk:12.4.0:rc1
cpe:/a:digium:asterisk:12.5.0
cpe:/a:digium:asterisk:12.5.0:rc1

Date published: 2014-11-26T10:59:01.447-05:00

Date last modified: 2014-11-26T16:51:09.983-05:00

CVSS Score: 4.0

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://downloads.asterisk.org/pub/security/AST-2014-009.html

Summary: The res_pjsip_pubsub module in Asterisk Open Source 12.x before 12.5.1 allows remote authenticated users to cause a denial of service (crash) via crafted headers in a SIP SUBSCRIBE request for an event package.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.