First published: Mon Nov 24 2014(Updated: )
ConfBridge in Asterisk 11.x before 11.14.1 and Certified Asterisk 11.6 before 11.6-cert8 does not properly handle state changes, which allows remote attackers to cause a denial of service (channel hang and memory consumption) by causing transitions to be delayed, which triggers a state change from hung up to waiting for media.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asterisk | <=11.14.0 | |
Digium Asterisk Appliance Developer Kit | =11.6-cert1 | |
Digium Asterisk Appliance Developer Kit | =11.6-cert2 | |
Digium Asterisk Appliance Developer Kit | =11.6-cert3 | |
Digium Asterisk Appliance Developer Kit | =11.6-cert4 | |
Digium Asterisk Appliance Developer Kit | =11.6-cert5 | |
Digium Asterisk Appliance Developer Kit | =11.6-cert6 | |
Digium Asterisk Appliance Developer Kit | =11.6-cert7 | |
Digium Asterisk Appliance Developer Kit | =11.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8414 has a critical severity rating as it allows remote attackers to cause denial of service.
To fix CVE-2014-8414, upgrade Asterisk to version 11.14.1 or later for Asterisk 11.x or to version 11.6-cert8 or later for Certified Asterisk.
CVE-2014-8414 can be exploited to cause denial of service through delayed state transitions, leading to channel hangs and memory consumption.
CVE-2014-8414 affects Asterisk 11.x before 11.14.1 and Certified Asterisk 11.6 before 11.6-cert8.
It is not safe to use such versions as they are vulnerable to remote denial of service attacks.