Vulnerabilities > CVE-2012-0885 - Unspecified vulnerability in Asterisk Open Source
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN asterisk
nessus
Summary
chan_sip.c in Asterisk Open Source 1.8.x before 1.8.8.2 and 10.x before 10.0.1, when the res_srtp module is used and media support is improperly configured, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted SDP message with a crypto attribute and a (1) video or (2) text media type, as demonstrated by CSipSimple.
Vulnerable Configurations
Nessus
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-201202-06.NASL description The remote host is affected by the vulnerability described in GLSA-201202-06 (Asterisk: Denial of Service) A vulnerability has been found in Asterisk last seen 2020-06-01 modified 2020-06-02 plugin id 58102 published 2012-02-23 reporter This script is Copyright (C) 2012-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/58102 title GLSA-201202-06 : Asterisk: Denial of Service NASL family Misc. NASL id ASTERISK_AST_2012_001.NASL description According to the version in its SIP banner, the version of Asterisk running on the remote host is potentially affected by a vulnerability that could allow a remote attacker to crash the server. The vulnerability can be triggered by attempting to negotiate a secure video stream when it has not been enabled and the res_srtp Asterisk module is loaded. last seen 2020-06-01 modified 2020-06-02 plugin id 58431 published 2012-03-22 reporter This script is Copyright (C) 2012-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/58431 title Asterisk SRTP Video Stream Negotiation Remote Crash (AST-2012-001)
References
- http://downloads.asterisk.org/pub/security/AST-2012-001.html
- http://downloads.asterisk.org/pub/security/AST-2012-001-1.8.diff
- http://downloads.asterisk.org/pub/security/AST-2012-001-10.diff
- http://www.openwall.com/lists/oss-security/2012/01/20/16
- http://www.openwall.com/lists/oss-security/2012/01/20/18
- https://bugzilla.redhat.com/show_bug.cgi?id=783487
- https://issues.asterisk.org/jira/browse/ASTERISK-19202
- https://issues.asterisk.org/jira/secure/attachment/42202/issueA19202_crypto_if_uninited_text_or_video.patch
- http://downloads.asterisk.org/pub/security/AST-2012-001.html
- https://issues.asterisk.org/jira/secure/attachment/42202/issueA19202_crypto_if_uninited_text_or_video.patch
- https://issues.asterisk.org/jira/browse/ASTERISK-19202
- https://bugzilla.redhat.com/show_bug.cgi?id=783487
- http://www.openwall.com/lists/oss-security/2012/01/20/18
- http://www.openwall.com/lists/oss-security/2012/01/20/16
- http://downloads.asterisk.org/pub/security/AST-2012-001-10.diff
- http://downloads.asterisk.org/pub/security/AST-2012-001-1.8.diff