First published: Wed Nov 26 2014(Updated: )
The res_pjsip_pubsub module in Asterisk Open Source 12.x before 12.5.1 allows remote authenticated users to cause a denial of service (crash) via crafted headers in a SIP SUBSCRIBE request for an event package.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asterisk | =12.0.0 | |
Asterisk | =12.1.0 | |
Asterisk | =12.1.0-rc1 | |
Asterisk | =12.1.0-rc2 | |
Asterisk | =12.1.0-rc3 | |
Asterisk | =12.2.0 | |
Asterisk | =12.2.0-rc1 | |
Asterisk | =12.2.0-rc2 | |
Asterisk | =12.2.0-rc3 | |
Asterisk | =12.3.0 | |
Asterisk | =12.3.0-rc1 | |
Asterisk | =12.3.0-rc2 | |
Asterisk | =12.4.0 | |
Asterisk | =12.4.0-rc1 | |
Asterisk | =12.5.0 | |
Asterisk | =12.5.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-6609 is considered a denial of service vulnerability, affecting Asterisk prior to version 12.5.1.
CVE-2014-6609 affects Asterisk versions 12.0.0 through 12.5.0, including specific release candidates.
To resolve CVE-2014-6609, upgrade to Asterisk version 12.5.1 or later.
CVE-2014-6609 allows remote authenticated users to cause a denial of service by sending crafted SIP SUBSCRIBE requests.
No, CVE-2014-6609 requires that the attacker be an authenticated user to exploit the vulnerability.