First published: Fri Oct 21 2011(Updated: )
chan_sip.c in the SIP channel driver in Asterisk Open Source 1.8.x before 1.8.7.1 and 10.x before 10.0.0-rc1 does not properly initialize variables during request parsing, which allows remote authenticated users to cause a denial of service (daemon crash) via a malformed request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asterisk | =10.0.0 | |
Asterisk | =1.8.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4063 has a high severity level as it can lead to a denial of service through a daemon crash.
To fix CVE-2011-4063, update Asterisk to version 1.8.7.1 or 10.0.0-rc1 or later.
CVE-2011-4063 can be exploited by sending malformed requests to the SIP channel driver.
Users of Asterisk Open Source versions 1.8.x before 1.8.7.1 and 10.x before 10.0.0-rc1 are affected by CVE-2011-4063.
There is no specific workaround for CVE-2011-4063; the recommended action is to upgrade to a patched version.