FKIE_CVE-2013-5642

Vulnerability from fkie_nvd - Published: 2013-09-09 17:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The SIP channel driver (channels/chan_sip.c) in Asterisk Open Source 1.8.x before 1.8.23.1, 10.x before 10.12.3, and 11.x before 11.5.1; Certified Asterisk 1.8.15 before 1.8.15-cert3 and 11.2 before 11.2-cert2; and Asterisk Digiumphones 10.x-digiumphones before 10.12.3-digiumphones allows remote attackers to cause a denial of service (NULL pointer dereference, segmentation fault, and daemon crash) via an invalid SDP that defines a media description before the connection description in a SIP request.
References
cve@mitre.orghttp://archives.neohapsis.com/archives/bugtraq/2013-08/0174.html
cve@mitre.orghttp://downloads.asterisk.org/pub/security/AST-2013-005.htmlPatch, Vendor Advisory
cve@mitre.orghttp://osvdb.org/96690
cve@mitre.orghttp://secunia.com/advisories/54534Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/54617
cve@mitre.orghttp://www.debian.org/security/2013/dsa-2749
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2013:223
cve@mitre.orghttp://www.securityfocus.com/bid/62022
cve@mitre.orghttp://www.securitytracker.com/id/1028957
cve@mitre.orghttps://issues.asterisk.org/jira/browse/ASTERISK-22007
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/bugtraq/2013-08/0174.html
af854a3a-2127-422b-91ae-364da2661108http://downloads.asterisk.org/pub/security/AST-2013-005.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/96690
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/54534Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/54617
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2013/dsa-2749
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2013:223
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/62022
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1028957
af854a3a-2127-422b-91ae-364da2661108https://issues.asterisk.org/jira/browse/ASTERISK-22007
Impacted products
Vendor Product Version
digium asterisk 1.8.17.0
digium asterisk 1.8.17.0
digium asterisk 1.8.17.0
digium asterisk 1.8.17.0
digium asterisk 1.8.18.0
digium asterisk 1.8.18.0
digium asterisk 1.8.18.1
digium asterisk 1.8.19.0
digium asterisk 1.8.19.0
digium asterisk 1.8.19.0
digium asterisk 1.8.19.1
digium asterisk 1.8.20.0
digium asterisk 1.8.20.0
digium asterisk 1.8.20.0
digium asterisk 1.8.21.0
digium asterisk 1.8.21.0
digium asterisk 1.8.22.0
digium asterisk 1.8.22.0
digium asterisk 1.8.22.0
digium asterisk 1.8.23.0
digium asterisk 1.8.23.0
digium asterisk 1.8.23.0
digium asterisk 10.10.0
digium asterisk 10.10.0
digium asterisk 10.10.0
digium asterisk 10.11.0
digium asterisk 10.11.0
digium asterisk 10.11.0
digium asterisk 10.11.0
digium asterisk 10.12.0
digium asterisk 10.12.0
digium asterisk 10.12.0
digium asterisk 10.12.1
digium asterisk 10.12.2
digium asterisk 11.0.0
digium asterisk 11.0.0
digium asterisk 11.0.0
digium asterisk 11.0.0
digium asterisk 11.0.0
digium asterisk 11.0.1
digium asterisk 11.0.2
digium asterisk 11.1.0
digium asterisk 11.1.0
digium asterisk 11.1.0
digium asterisk 11.1.1
digium asterisk 11.1.2
digium asterisk 11.2.0
digium asterisk 11.2.0
digium asterisk 11.3.0
digium asterisk 11.3.0
digium asterisk 11.4.0
digium asterisk 11.4.0
digium asterisk 11.4.0
digium asterisk 11.4.0
digium asterisk 11.5.0
digium asterisk 11.5.0
digium asterisk 11.5.0
digium asterisk 11.5.1
digium asterisk_digiumphones 10.0.0
digium asterisk_digiumphones 10.0.0
digium asterisk_digiumphones 10.0.0
digium asterisk_digiumphones 10.11.0
digium asterisk_digiumphones 10.11.0
digium asterisk_digiumphones 10.11.0
digium asterisk_digiumphones 10.11.0
digium asterisk_digiumphones 10.12.0
digium asterisk_digiumphones 10.12.0
digium asterisk_digiumphones 10.12.0
digium asterisk_digiumphones 10.12.1
digium asterisk_digiumphones 10.12.2
digium certified_asterisk 1.8.15
digium certified_asterisk 1.8.15
digium certified_asterisk 1.8.15
digium certified_asterisk 1.8.15
digium certified_asterisk 1.8.15
digium certified_asterisk 1.8.15
digium certified_asterisk 1.8.15
digium certified_asterisk 11.2.0
digium certified_asterisk 11.2.0
digium certified_asterisk 11.2.0
digium certified_asterisk 11.2.0

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F368897-A481-42DD-A8B0-8AD43A5FD68B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "6BA8F4AF-26C0-4A69-B489-16E7A56E5123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FE82D53D-092D-4B36-A979-23E9A5E07A78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "27365383-72DB-4683-9A67-CF553FF2620A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "46EE63D4-CA9C-4DF4-AF85-B8AC2E3F844A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "91407E03-4E98-4DD9-B584-E5BB74F09B9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "669CC22C-45E5-40AB-9A95-D7DFD694B688",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "80A38E0C-45D9-4353-8426-87A4CFA371DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "54A934AE-AB7C-4D10-8BA2-9C54410C648F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "7A7C5A8E-35E6-4B86-8502-1970031AB987",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FA4C14B-A01C-4CFE-8985-317ACCDAD209",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1224686C-8A1E-40E1-ACB9-87F571641EAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "619704FF-2F0C-47E8-A340-58135CEE6B89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "E412E336-871A-4CAC-97E5-FB203BB9349D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.21.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FC1A0E66-63F4-4BD0-8C9A-3D23A116EE08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.21.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "79963FF0-5ED6-41B6-8E60-146BD7879518",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.22.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B63FB1C5-9704-4C6A-8DE6-2283D1993BA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.22.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0787BC7B-9464-4AAA-896B-C028ECF8E397",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.22.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "84C0FBC8-9CD1-4135-94C7-BE90A7C94625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE14D16B-4903-47BD-BCBD-28A8B6B878E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FD3948A1-B5A6-4702-9187-A7720E81B7F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "BC097BB6-02E9-4F48-98CB-B5F31B41009C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0992625B-012F-40EA-9A20-6352E633F62B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.10.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E3828876-DDB4-457D-8E50-43A4FF761005",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.10.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "79283554-AF08-44DC-BF98-446C47AA490A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "54EBFD0B-686F-477F-8FF2-535F24A3348B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.11.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0961F130-FF8C-41C2-BF2E-9731ED9EB73B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.11.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "BE78F4A2-B165-446C-AA1C-7A9E13718C6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.11.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "9789FC49-DE20-4477-B9D5-12CB71F42E58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DD97918-B589-4422-B695-C3C00203A3DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.12.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1E59E84-F3FF-44FF-BC7D-31F3880E32F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.12.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "2D9C7006-F5B1-4171-BB44-182C39DE3AAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8D2B210-3ADA-40AD-A575-DB88A9F71C91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F7C53CD-260C-49F5-BCA4-E1D0A58E0B29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53B8453-F35A-49BE-8129-774BADF71BA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "CCB0C07E-DA2F-4169-848D-C3315CDC1CB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "410C43E6-5912-4C22-A592-7CF94402EEB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D50A355E-1B55-4DD2-8100-EB81AA6FC40E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "9ADF4230-EFEB-45EC-9C96-0262B4A3E459",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5234531C-F69A-4B94-A480-147734206C5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "321C1066-6800-4488-A7C4-BE91FF738453",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9B51588-50A2-40B2-A007-06F57D38C7AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CDE2B00C-6AC0-4166-8A25-EFC42CE7F737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "617FC4AF-D152-4EE1-828D-C2A6AD0DFD3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A3FE6DC-17FD-4CEE-BDFB-9D4685640381",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CEEB6C2-0A6D-4434-8446-CB8605CD3B14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1548C574-CD51-49F6-91B1-B06C504000E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D56C2C11-4B42-43AB-9DAE-61C15D107160",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.3.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "69F2DED4-39F5-44C8-BEA3-22692D28C631",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.3.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "AD172E70-238B-4B01-A922-8021B5627092",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C689A32B-E87D-492F-B3F6-7B80DFA049C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "5FB3863D-7F46-4C4A-9E6B-C255CDF0D953",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7239304D-C383-4F26-BB08-65ADD2380015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "1AC153C2-258E-4EE6-845F-8E8C68AA242D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "229B7982-9775-42AA-B8F5-FE920CCAA497",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.5.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "326845DF-2DB2-406B-BE0F-877384DAACFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.5.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "E0FC2D46-FD1B-421F-8773-BB41B1E9A831",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8788AF7B-CBB6-4D9D-A748-486787935A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB19B2F7-5685-449F-858C-C226D2A373B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D10B9E8C-3B72-490B-A276-A745299DA3C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "E63CF763-0682-4453-8D07-C9253C179486",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FDB7AA1-25A7-4BED-A875-C0494E973EA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.11.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E0BCE319-8C87-4521-BEAA-02F0EF47B315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.11.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "5A2534F0-3DEE-4FCB-B15D-97D1836CE83D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.11.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "D3F38B78-8215-43D6-8C5C-6DB8E6C34F06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE54B76B-4713-4281-AB4B-B17901121B89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.12.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "08EE9963-2A44-48A0-8A1B-919CCE3652FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.12.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "19C7B58B-6591-45B5-B527-50FA0A5BD1A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D3825F-3B95-4056-AF3C-43269734BA2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "806F60DA-FAA1-4C13-889B-0FF518C01E44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6DDE265-B4B9-495A-95F7-0910E8199980",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1:*:*:*:*:*:*",
              "matchCriteriaId": "2365F1EE-16A4-4293-B80E-A51CD6A2F112",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1-rc1:*:*:*:*:*:*",
              "matchCriteriaId": "6B7AE7FB-8170-41AD-9597-07335D36AE48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1-rc2:*:*:*:*:*:*",
              "matchCriteriaId": "9131FB32-E3F0-476C-A0D1-36E2101631D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1-rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5209356B-4A86-4C93-9D04-C66969F23BC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert2:*:*:*:*:*:*",
              "matchCriteriaId": "F087C546-FBCA-4D0D-A023-8F9384CD160C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "9AF5750B-2348-4E35-9F08-27E2385E329F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:11.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0344FE7-952A-4BC5-A31F-F2C5EABDB5FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:11.2.0:cert1:*:*:*:*:*:*",
              "matchCriteriaId": "960521C4-9004-4412-8A38-66240C4B875D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:11.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "00F26342-110F-4163-AD11-98AA3B71D299",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:11.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "8652FA73-2F02-401C-890F-0544276294D3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SIP channel driver (channels/chan_sip.c) in Asterisk Open Source 1.8.x before 1.8.23.1, 10.x before 10.12.3, and 11.x before 11.5.1; Certified Asterisk 1.8.15 before 1.8.15-cert3 and 11.2 before 11.2-cert2; and Asterisk Digiumphones 10.x-digiumphones before 10.12.3-digiumphones allows remote attackers to cause a denial of service (NULL pointer dereference, segmentation fault, and daemon crash) via an invalid SDP that defines a media description before the connection description in a SIP request."
    },
    {
      "lang": "es",
      "value": "El controlador de canal SIP (channels/chan_sip.c) en Asterisk Open Source 1.8.x (anteriores a 1.8.23.1), 10.x (anteriores a 10.12.3), y 11.x (anteriores a 11.5.1); Certified Asterisk 1.8.15 (anteriores a 1.8.15-cert3) y 11.2 (anteriores a 11.2-cert2); y Asterisk Digiumphones 10.x-digiumphones (anteriores a 10.12.3-digiumphones) permiten a un atcante remoto causar una denegaci\u00f3n de servicio (referencia a puntero nulo, corrupci\u00f3n de memoria, y ca\u00edda del demonio) a trav\u00e9s de un SDP inv\u00e1lido que define una descripci\u00f3n de medios antes de la descripci\u00f3n de conexi\u00f3n en una petici\u00f3n SIP."
    }
  ],
  "id": "CVE-2013-5642",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-09-09T17:55:06.267",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2013-08/0174.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://downloads.asterisk.org/pub/security/AST-2013-005.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/96690"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/54534"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/54617"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2013/dsa-2749"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:223"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/62022"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id/1028957"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://issues.asterisk.org/jira/browse/ASTERISK-22007"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2013-08/0174.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://downloads.asterisk.org/pub/security/AST-2013-005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/96690"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/54534"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/54617"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2013/dsa-2749"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:223"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/62022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1028957"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.asterisk.org/jira/browse/ASTERISK-22007"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…