First published: Mon Oct 23 2006(Updated: )
Unspecified vulnerability in the SIP channel driver (channels/chan_sip.c) in Asterisk 1.2.x before 1.2.13 and 1.4.x before 1.4.0-beta3 allows remote attackers to cause a denial of service (resource consumption) via unspecified vectors that result in the creation of "a real pvt structure" that uses more resources than necessary.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asterisk | =1.2.0_beta1 | |
Asterisk | =1.2.0_beta2 | |
Asterisk | =1.2.6 | |
Asterisk | =1.2.7 | |
Asterisk | =1.2.8 | |
Asterisk | =1.2.9 | |
Asterisk | =1.2.10 | |
Asterisk | =1.2.11 | |
Asterisk | =1.2.12 | |
Asterisk | =1.2.12.1 | |
Asterisk | =1.4.0 | |
Asterisk | =1.4.0_beta1 | |
Asterisk | =1.4.0_beta2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5445 has been classified as having a medium severity rating due to its potential to cause denial of service.
To fix CVE-2006-5445, you should upgrade to Asterisk version 1.2.13 or later, or 1.4.0-beta3 or later.
CVE-2006-5445 affects Asterisk versions 1.2.x before 1.2.13 and 1.4.x before 1.4.0-beta3.
CVE-2006-5445 is a denial of service vulnerability that can lead to resource consumption.
Yes, CVE-2006-5445 can be exploited by remote attackers without requiring local access.