Vulnerabilities > CVE-2012-0885 - Unspecified vulnerability in Asterisk Open Source

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
asterisk
nessus

Summary

chan_sip.c in Asterisk Open Source 1.8.x before 1.8.8.2 and 10.x before 10.0.1, when the res_srtp module is used and media support is improperly configured, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted SDP message with a crypto attribute and a (1) video or (2) text media type, as demonstrated by CSipSimple.

Nessus

  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201202-06.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201202-06 (Asterisk: Denial of Service) A vulnerability has been found in Asterisk
    last seen2020-06-01
    modified2020-06-02
    plugin id58102
    published2012-02-23
    reporterThis script is Copyright (C) 2012-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/58102
    titleGLSA-201202-06 : Asterisk: Denial of Service
  • NASL familyMisc.
    NASL idASTERISK_AST_2012_001.NASL
    descriptionAccording to the version in its SIP banner, the version of Asterisk running on the remote host is potentially affected by a vulnerability that could allow a remote attacker to crash the server. The vulnerability can be triggered by attempting to negotiate a secure video stream when it has not been enabled and the res_srtp Asterisk module is loaded.
    last seen2020-06-01
    modified2020-06-02
    plugin id58431
    published2012-03-22
    reporterThis script is Copyright (C) 2012-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/58431
    titleAsterisk SRTP Video Stream Negotiation Remote Crash (AST-2012-001)