First published: Mon Nov 24 2014(Updated: )
Use-after-free vulnerability in the PJSIP channel driver in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1, when using the res_pjsip_refer module, allows remote attackers to cause a denial of service (crash) via an in-dialog INVITE with Replaces message, which triggers the channel to be hung up.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asterisk | >=12.0.0<12.7.1 | |
Asterisk | >=13.0.0<13.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8416 is rated as a high severity vulnerability due to its potential to cause a denial of service.
To fix CVE-2014-8416, upgrade Asterisk to version 12.7.1 or later, or 13.0.1 or later.
CVE-2014-8416 affects Asterisk versions prior to 12.7.1 and 13.0.1 when using the res_pjsip_refer module.
CVE-2014-8416 enables remote attackers to cause a denial of service attack via an in-dialog INVITE with a Replaces message.
If you cannot update, consider implementing network-level controls to restrict access to vulnerable Asterisk services.