First published: Tue Jun 17 2014(Updated: )
The PJSIP Channel Driver in Asterisk Open Source before 12.3.1 allows remote attackers to cause a denial of service (deadlock) by terminating a subscription request before it is complete, which triggers a SIP transaction timeout.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asterisk | <=12.3.0 | |
Asterisk | =12.0.0 | |
Asterisk | =12.1.0 | |
Asterisk | =12.1.0-rc1 | |
Asterisk | =12.1.0-rc2 | |
Asterisk | =12.1.0-rc3 | |
Asterisk | =12.1.1 | |
Asterisk | =12.2.0 | |
Asterisk | =12.2.0-rc1 | |
Asterisk | =12.2.0-rc2 | |
Asterisk | =12.2.0-rc3 | |
Asterisk | =12.3.0-rc1 | |
Asterisk | =12.3.0-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4048 has been classified as a moderate severity vulnerability.
To fix CVE-2014-4048, upgrade your Asterisk installation to version 12.3.1 or later.
CVE-2014-4048 allows for a denial of service attack by causing a deadlock through improper handling of SIP subscription requests.
CVE-2014-4048 affects Asterisk versions up to and including 12.3.0.
Yes, CVE-2014-4048 can be exploited by remote attackers.