First published: Mon Apr 30 2012(Updated: )
chan_sip.c in the SIP channel driver in Asterisk Open Source 1.8.x before 1.8.11.1 and 10.x before 10.3.1 and Asterisk Business Edition C.3.x before C.3.7.4, when the trustrpid option is enabled, allows remote authenticated users to cause a denial of service (daemon crash) by sending a SIP UPDATE message that triggers a connected-line update attempt without an associated channel.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asterisk | =1.6.2.0 | |
Asterisk | =1.6.2.0-rc2 | |
Asterisk | =1.6.2.0-rc3 | |
Asterisk | =1.6.2.0-rc4 | |
Asterisk | =1.6.2.0-rc5 | |
Asterisk | =1.6.2.0-rc6 | |
Asterisk | =1.6.2.0-rc7 | |
Asterisk | =1.6.2.0-rc8 | |
Asterisk | =1.6.2.1 | |
Asterisk | =1.6.2.1-rc1 | |
Asterisk | =1.6.2.2 | |
Asterisk | =1.6.2.3-rc2 | |
Asterisk | =1.6.2.4 | |
Asterisk | =1.6.2.5 | |
Asterisk | =1.6.2.6 | |
Asterisk | =1.6.2.6-rc1 | |
Asterisk | =1.6.2.6-rc2 | |
Asterisk | =1.6.2.7 | |
Asterisk | =1.6.2.7-rc1 | |
Asterisk | =1.6.2.7-rc2 | |
Asterisk | =1.6.2.7-rc3 | |
Asterisk | =1.6.2.8 | |
Asterisk | =1.6.2.8-rc1 | |
Asterisk | =1.6.2.9 | |
Asterisk | =1.6.2.9-rc1 | |
Asterisk | =1.6.2.9-rc2 | |
Asterisk | =1.6.2.9-rc3 | |
Asterisk | =1.6.2.10 | |
Asterisk | =1.6.2.10-rc1 | |
Asterisk | =1.6.2.10-rc2 | |
Asterisk | =1.6.2.11 | |
Asterisk | =1.6.2.11-rc1 | |
Asterisk | =1.6.2.11-rc2 | |
Asterisk | =1.6.2.12 | |
Asterisk | =1.6.2.12-rc1 | |
Asterisk | =1.6.2.13 | |
Asterisk | =1.6.2.14 | |
Asterisk | =1.6.2.14-rc1 | |
Asterisk | =1.6.2.15 | |
Asterisk | =1.6.2.15-rc1 | |
Asterisk | =1.6.2.15.1 | |
Asterisk | =1.6.2.16 | |
Asterisk | =1.6.2.16-rc1 | |
Asterisk | =1.6.2.16.1 | |
Asterisk | =1.6.2.16.2 | |
Asterisk | =1.6.2.17 | |
Asterisk | =1.6.2.17-rc1 | |
Asterisk | =1.6.2.17-rc2 | |
Asterisk | =1.6.2.17-rc3 | |
Asterisk | =1.6.2.17.1 | |
Asterisk | =1.6.2.17.2 | |
Asterisk | =1.6.2.17.3 | |
Asterisk | =1.6.2.18 | |
Asterisk | =1.6.2.18-rc1 | |
Asterisk | =1.6.2.18.1 | |
Asterisk | =1.6.2.18.2 | |
Asterisk | =1.6.2.19 | |
Asterisk | =1.6.2.19-rc1 | |
Asterisk | =1.6.2.20 | |
Asterisk | =1.6.2.21 | |
Asterisk | =1.6.2.22 | |
Asterisk | =1.6.2.23 | |
Asterisk | =1.8.0 | |
Asterisk | =1.8.0-beta1 | |
Asterisk | =1.8.0-beta2 | |
Asterisk | =1.8.0-beta3 | |
Asterisk | =1.8.0-beta4 | |
Asterisk | =1.8.0-beta5 | |
Asterisk | =1.8.0-rc2 | |
Asterisk | =1.8.0-rc3 | |
Asterisk | =1.8.0-rc4 | |
Asterisk | =1.8.0-rc5 | |
Asterisk | =1.8.1 | |
Asterisk | =1.8.1-rc1 | |
Asterisk | =1.8.1.1 | |
Asterisk | =1.8.1.2 | |
Asterisk | =1.8.2 | |
Asterisk | =1.8.2-rc1 | |
Asterisk | =1.8.2.1 | |
Asterisk | =1.8.2.2 | |
Asterisk | =1.8.2.3 | |
Asterisk | =1.8.2.4 | |
Asterisk | =1.8.3 | |
Asterisk | =1.8.3-rc1 | |
Asterisk | =1.8.3-rc2 | |
Asterisk | =1.8.3-rc3 | |
Asterisk | =1.8.3.1 | |
Asterisk | =1.8.3.2 | |
Asterisk | =1.8.3.3 | |
Asterisk | =1.8.4 | |
Asterisk | =1.8.4-rc1 | |
Asterisk | =1.8.4-rc2 | |
Asterisk | =1.8.4-rc3 | |
Asterisk | =1.8.4.1 | |
Asterisk | =1.8.4.2 | |
Asterisk | =1.8.4.3 | |
Asterisk | =1.8.4.4 | |
Asterisk | =1.8.5-rc1 | |
Asterisk | =1.8.5.0 | |
Asterisk | =1.8.6.0 | |
Asterisk | =1.8.6.0-rc1 | |
Asterisk | =1.8.6.0-rc2 | |
Asterisk | =1.8.6.0-rc3 | |
Asterisk | =1.8.7.0 | |
Asterisk | =1.8.7.0-rc1 | |
Asterisk | =1.8.7.0-rc2 | |
Asterisk | =1.8.7.1 | |
Asterisk | =1.8.7.2 | |
Asterisk | =1.8.8.0 | |
Asterisk | =1.8.8.0-rc1 | |
Asterisk | =1.8.8.0-rc2 | |
Asterisk | =1.8.8.0-rc3 | |
Asterisk | =1.8.8.0-rc4 | |
Asterisk | =1.8.8.0-rc5 | |
Asterisk | =1.8.8.1 | |
Asterisk | =1.8.8.2 | |
Asterisk | =1.8.9.0 | |
Asterisk | =1.8.9.0-rc1 | |
Asterisk | =1.8.9.0-rc2 | |
Asterisk | =1.8.9.0-rc3 | |
Asterisk | =1.8.9.1 | |
Asterisk | =1.8.9.2 | |
Asterisk | =1.8.9.3 | |
Asterisk | =1.8.10.0 | |
Asterisk | =1.8.10.0-rc1 | |
Asterisk | =1.8.10.0-rc2 | |
Asterisk | =1.8.10.0-rc3 | |
Asterisk | =1.8.10.0-rc4 | |
Asterisk | =1.8.10.1 | |
Asterisk | =1.8.11.0-rc2 | |
Asterisk | =1.8.11.0-rc3 | |
Asterisk | =10.0.0 | |
Asterisk | =10.0.0-beta1 | |
Asterisk | =10.0.0-beta2 | |
Asterisk | =10.0.0-rc1 | |
Asterisk | =10.0.0-rc2 | |
Asterisk | =10.0.0-rc3 | |
Asterisk | =10.0.1 | |
Asterisk | =10.1.0 | |
Asterisk | =10.1.0-rc1 | |
Asterisk | =10.1.0-rc2 | |
Asterisk | =10.1.1 | |
Asterisk | =10.1.2 | |
Asterisk | =10.1.3 | |
Asterisk | =10.2.0 | |
Asterisk | =10.2.0-rc1 | |
Asterisk | =10.2.0-rc2 | |
Asterisk | =10.2.0-rc3 | |
Asterisk | =10.2.0-rc4 | |
Asterisk | =10.2.1 | |
Asterisk | =10.3.0 | |
Asterisk | =10.3.0-rc2 | |
Asterisk | =10.3.0-rc3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2012-2416 is classified as high due to the potential for remote denial of service attacks.
To fix CVE-2012-2416, update Asterisk to versions 1.8.11.1, 10.3.1, or later.
CVE-2012-2416 affects Asterisk Open Source versions 1.8.x before 1.8.11.1 and 10.x before 10.3.1.
No, CVE-2012-2416 can only be exploited by remote authenticated users.
CVE-2012-2416 can cause a denial of service by crashing the Asterisk daemon.