First published: Thu Jul 30 2009(Updated: )
main/rtp.c in Asterisk Open Source 1.6.1 before 1.6.1.2 allows remote attackers to cause a denial of service (crash) via an RTP text frame without a certain delimiter, which triggers a NULL pointer dereference and the subsequent calculation of an invalid pointer.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asterisk | =1.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-2651 has a medium severity rating due to its ability to cause a denial of service.
To resolve CVE-2009-2651, upgrade Asterisk Open Source to version 1.6.1.2 or later.
CVE-2009-2651 affects Asterisk Open Source version 1.6.1 and prior.
CVE-2009-2651 is a denial of service vulnerability caused by a NULL pointer dereference.
Yes, CVE-2009-2651 can be exploited remotely by sending a malformed RTP text frame.