Vulnerabilities > Digium > Asterisk > 1.8.1.2

DATE CVE VULNERABILITY TITLE RISK
2012-07-09 CVE-2012-3812 Resource Management Errors vulnerability in Digium Asterisk, Asteriske and Certified Asterisk
Double free vulnerability in apps/app_voicemail.c in Asterisk Open Source 1.8.x before 1.8.13.1 and 10.x before 10.5.2, Certified Asterisk 1.8.11-certx before 1.8.11-cert4, and Asterisk Digiumphones 10.x.x-digiumphones before 10.5.2-digiumphones allows remote authenticated users to cause a denial of service (daemon crash) by establishing multiple voicemail sessions and accessing both the Urgent mailbox and the INBOX mailbox.
network
low complexity
digium CWE-399
4.0
2012-07-09 CVE-2012-3863 Resource Management Errors vulnerability in Digium products
channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.13.1 and 10.x before 10.5.2, Asterisk Business Edition C.3.x before C.3.7.5, Certified Asterisk 1.8.11-certx before 1.8.11-cert4, and Asterisk Digiumphones 10.x.x-digiumphones before 10.5.2-digiumphones does not properly handle a provisional response to a SIP reINVITE request, which allows remote authenticated users to cause a denial of service (RTP port exhaustion) via sessions that lack final responses.
network
low complexity
digium CWE-399
4.0
2012-06-02 CVE-2012-2947 Improper Access Control vulnerability in multiple products
chan_iax2.c in the IAX2 channel driver in Certified Asterisk 1.8.11-cert before 1.8.11-cert2 and Asterisk Open Source 1.8.x before 1.8.12.1 and 10.x before 10.4.1, when a certain mohinterpret setting is enabled, allows remote attackers to cause a denial of service (daemon crash) by placing a call on hold.
network
high complexity
debian digium CWE-284
2.6
2011-12-15 CVE-2011-4598 Information Exposure vulnerability in Digium Asterisk
The handle_request_info function in channels/chan_sip.c in Asterisk Open Source 1.6.2.x before 1.6.2.21 and 1.8.x before 1.8.7.2, when automon is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted sequence of SIP requests.
network
digium CWE-200
4.3
2011-12-15 CVE-2011-4597 Information Exposure vulnerability in Digium Asterisk
The SIP over UDP implementation in Asterisk Open Source 1.4.x before 1.4.43, 1.6.x before 1.6.2.21, and 1.8.x before 1.8.7.2 uses different port numbers for responses to invalid requests depending on whether a SIP username exists, which allows remote attackers to enumerate usernames via a series of requests.
network
low complexity
digium CWE-200
5.0
2011-07-06 CVE-2011-2665 Denial-Of-Service vulnerability in Asterisk
reqresp_parser.c in the SIP channel driver in Asterisk Open Source 1.8.x before 1.8.4.3 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a SIP packet with a Contact header that lacks a < (less than) character.
network
low complexity
digium
5.0
2011-07-06 CVE-2011-2536 Information Exposure vulnerability in Digium Asterisk
chan_sip.c in the SIP channel driver in Asterisk Open Source 1.4.x before 1.4.41.2, 1.6.2.x before 1.6.2.18.2, and 1.8.x before 1.8.4.4, and Asterisk Business Edition C.3.x before C.3.7.3, disregards the alwaysauthreject option and generates different responses for invalid SIP requests depending on whether the user account exists, which allows remote attackers to enumerate account names via a series of requests.
network
low complexity
digium CWE-200
5.0
2011-07-06 CVE-2011-2535 Improper Input Validation vulnerability in Digium Asterisk
chan_iax2.c in the IAX2 channel driver in Asterisk Open Source 1.4.x before 1.4.41.1, 1.6.2.x before 1.6.2.18.1, and 1.8.x before 1.8.4.3, and Asterisk Business Edition C.3 before C.3.7.3, accesses a memory address contained in an option control frame, which allows remote attackers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a crafted frame.
network
low complexity
digium CWE-20
5.0
2011-07-06 CVE-2011-2529 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Digium Asterisk
chan_sip.c in the SIP channel driver in Asterisk Open Source 1.6.x before 1.6.2.18.1 and 1.8.x before 1.8.4.3 does not properly handle '\0' characters in SIP packets, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted packet.
network
low complexity
digium CWE-119
5.0
2011-06-06 CVE-2011-2216 Denial of Service vulnerability in Asterisk 'Contact' Header SIP Channel Driver
reqresp_parser.c in the SIP channel driver in Asterisk Open Source 1.8.x before 1.8.4.2 does not initialize certain strings, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed Contact header.
network
low complexity
digium
5.0