CVE-2014-6610CVE-2014-6610

Affected configuration(s):

cpe:/a:digium:asterisk:11.0.0
cpe:/a:digium:asterisk:11.0.0:beta1
cpe:/a:digium:asterisk:11.0.0:beta2
cpe:/a:digium:asterisk:11.0.0:rc1
cpe:/a:digium:asterisk:11.0.0:rc2
cpe:/a:digium:asterisk:11.1.0
cpe:/a:digium:asterisk:11.1.0:rc1
cpe:/a:digium:asterisk:11.1.0:rc2
cpe:/a:digium:asterisk:11.1.0:rc3
cpe:/a:digium:asterisk:11.2.0
cpe:/a:digium:asterisk:11.2.0:rc1
cpe:/a:digium:asterisk:11.2.0:rc2
cpe:/a:digium:asterisk:11.3.0:rc1
cpe:/a:digium:asterisk:11.3.0:rc2
cpe:/a:digium:asterisk:11.4.0
cpe:/a:digium:asterisk:11.4.0:rc1
cpe:/a:digium:asterisk:11.4.0:rc2
cpe:/a:digium:asterisk:11.4.0:rc3
cpe:/a:digium:asterisk:11.4.0:rc4
cpe:/a:digium:asterisk:11.5.0
cpe:/a:digium:asterisk:11.5.0:rc1
cpe:/a:digium:asterisk:11.5.0:rc2
cpe:/a:digium:asterisk:11.6.0
cpe:/a:digium:asterisk:11.6.0:rc1
cpe:/a:digium:asterisk:11.6.0:rc2
cpe:/a:digium:asterisk:11.7.0
cpe:/a:digium:asterisk:11.7.0:rc1
cpe:/a:digium:asterisk:11.7.0:rc2
cpe:/a:digium:asterisk:11.8.0
cpe:/a:digium:asterisk:11.8.0:rc1
cpe:/a:digium:asterisk:11.8.0:rc2
cpe:/a:digium:asterisk:11.8.0:rc3
cpe:/a:digium:asterisk:11.9.0
cpe:/a:digium:asterisk:11.9.0:rc1
cpe:/a:digium:asterisk:11.9.0:rc2
cpe:/a:digium:asterisk:11.9.0:rc3
cpe:/a:digium:asterisk:11.10.0
cpe:/a:digium:asterisk:11.10.0:rc1
cpe:/a:digium:asterisk:11.11.0
cpe:/a:digium:asterisk:11.11.0:rc1
cpe:/a:digium:asterisk:11.12.0
cpe:/a:digium:asterisk:12.0.0
cpe:/a:digium:asterisk:12.1.0
cpe:/a:digium:asterisk:12.1.0:rc1
cpe:/a:digium:asterisk:12.1.0:rc2
cpe:/a:digium:asterisk:12.1.0:rc3
cpe:/a:digium:asterisk:12.2.0
cpe:/a:digium:asterisk:12.2.0:rc1
cpe:/a:digium:asterisk:12.2.0:rc2
cpe:/a:digium:asterisk:12.2.0:rc3
cpe:/a:digium:asterisk:12.3.0
cpe:/a:digium:asterisk:12.3.0:rc1
cpe:/a:digium:asterisk:12.3.0:rc2
cpe:/a:digium:asterisk:12.4.0
cpe:/a:digium:asterisk:12.4.0:rc1
cpe:/a:digium:asterisk:12.5.0
cpe:/a:digium:asterisk:12.5.0:rc1
cpe:/a:digium:certified_asterisk:11.6:cert1:~~lts~~~
cpe:/a:digium:certified_asterisk:11.6:cert2:~~lts~~~
cpe:/a:digium:certified_asterisk:11.6:cert3:~~lts~~~
cpe:/a:digium:certified_asterisk:11.6:cert4:~~lts~~~
cpe:/a:digium:certified_asterisk:11.6:cert5:~~lts~~~
cpe:/a:digium:certified_asterisk:11.6.0::~~lts~~~

Date published: 2014-11-26T10:59:02.573-05:00

Date last modified: 2014-11-26T16:33:43.760-05:00

CVSS Score: 4.0

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://downloads.asterisk.org/pub/security/AST-2014-010.html

Summary: Asterisk Open Source 11.x before 11.12.1 and 12.x before 12.5.1 and Certified Asterisk 11.6 before 11.6-cert6, when using the res_fax_spandsp module, allows remote authenticated users to cause a denial of service (crash) via an out of call message, which is not properly handled in the ReceiveFax dialplan application.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.