4.3
CVE-2012-0885
- EPSS 1.06%
- Veröffentlicht 25.01.2012 15:55:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
- Quelle cve@mitre.org
- Teams Watchlist Login
- Unerledigt Login
chan_sip.c in Asterisk Open Source 1.8.x before 1.8.8.2 and 10.x before 10.0.1, when the res_srtp module is used and media support is improperly configured, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted SDP message with a crypto attribute and a (1) video or (2) text media type, as demonstrated by CSipSimple.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Asterisk ≫ Open Source Version1.8.0
Asterisk ≫ Open Source Version1.8.0 Updatebeta1
Asterisk ≫ Open Source Version1.8.0 Updatebeta2
Asterisk ≫ Open Source Version1.8.0 Updatebeta3
Asterisk ≫ Open Source Version1.8.0 Updatebeta4
Asterisk ≫ Open Source Version1.8.0 Updatebeta5
Asterisk ≫ Open Source Version1.8.0 Updaterc2
Asterisk ≫ Open Source Version1.8.0 Updaterc3
Asterisk ≫ Open Source Version1.8.0 Updaterc4
Asterisk ≫ Open Source Version1.8.0 Updaterc5
Asterisk ≫ Open Source Version1.8.1
Asterisk ≫ Open Source Version1.8.1 Updaterc1
Asterisk ≫ Open Source Version1.8.1.1
Asterisk ≫ Open Source Version1.8.1.2
Asterisk ≫ Open Source Version1.8.2
Asterisk ≫ Open Source Version1.8.2 Updaterc1
Asterisk ≫ Open Source Version1.8.2.1
Asterisk ≫ Open Source Version1.8.2.2
Asterisk ≫ Open Source Version1.8.2.3
Asterisk ≫ Open Source Version1.8.2.4
Asterisk ≫ Open Source Version1.8.3
Asterisk ≫ Open Source Version1.8.3 Updaterc1
Asterisk ≫ Open Source Version1.8.3 Updaterc2
Asterisk ≫ Open Source Version1.8.3 Updaterc3
Asterisk ≫ Open Source Version1.8.3.1
Asterisk ≫ Open Source Version1.8.3.2
Asterisk ≫ Open Source Version1.8.3.3
Asterisk ≫ Open Source Version1.8.4
Asterisk ≫ Open Source Version1.8.4 Updaterc1
Asterisk ≫ Open Source Version1.8.4 Updaterc2
Asterisk ≫ Open Source Version1.8.4 Updaterc3
Asterisk ≫ Open Source Version1.8.4.1
Asterisk ≫ Open Source Version1.8.4.2
Asterisk ≫ Open Source Version1.8.4.3
Asterisk ≫ Open Source Version1.8.4.4
Asterisk ≫ Open Source Version1.8.5 Updaterc1
Asterisk ≫ Open Source Version1.8.5.0
Asterisk ≫ Open Source Version1.8.6.0
Asterisk ≫ Open Source Version1.8.6.0 Updaterc1
Asterisk ≫ Open Source Version1.8.6.0 Updaterc2
Asterisk ≫ Open Source Version1.8.6.0 Updaterc3
Asterisk ≫ Open Source Version1.8.7.0
Asterisk ≫ Open Source Version1.8.7.0 Updaterc1
Asterisk ≫ Open Source Version1.8.7.0 Updaterc2
Asterisk ≫ Open Source Version1.8.7.1
Asterisk ≫ Open Source Version1.8.7.2
Asterisk ≫ Open Source Version1.8.8.0
Asterisk ≫ Open Source Version1.8.8.0 Updaterc1
Asterisk ≫ Open Source Version1.8.8.0 Updaterc2
Asterisk ≫ Open Source Version1.8.8.0 Updaterc3
Asterisk ≫ Open Source Version1.8.8.0 Updaterc4
Asterisk ≫ Open Source Version1.8.8.0 Updaterc5
Asterisk ≫ Open Source Version1.8.8.1
Asterisk ≫ Open Source Version10.0.0
Asterisk ≫ Open Source Version10.0.0 Updatebeta1
Asterisk ≫ Open Source Version10.0.0 Updatebeta2
Asterisk ≫ Open Source Version10.0.0 Updaterc1
Asterisk ≫ Open Source Version10.0.0 Updaterc2
Asterisk ≫ Open Source Version10.0.0 Updaterc3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 1.06% | 0.756 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:N/I:N/A:P
|