First published: Fri Jun 02 2017(Updated: )
A memory exhaustion vulnerability exists in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1 and Certified Asterisk 13.13 before 13.13-cert4, which can be triggered by sending specially crafted SCCP packets causing an infinite loop and leading to memory exhaustion (by message logging in that loop).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asterisk Open Source | =13.0.0 | |
Asterisk Open Source | =13.1.0 | |
Asterisk Open Source | =13.1.0-rc1 | |
Asterisk Open Source | =13.1.0-rc2 | |
Asterisk Open Source | =13.2.0 | |
Asterisk Open Source | =13.2.0-rc1 | |
Asterisk Open Source | =13.3.0-rc1 | |
Asterisk Open Source | =13.4.0 | |
Asterisk Open Source | =13.4.0-rc1 | |
Asterisk Open Source | =13.5.0 | |
Asterisk Open Source | =13.5.0-rc1 | |
Asterisk Open Source | =13.6.0-rc1 | |
Asterisk Open Source | =13.7.0 | |
Asterisk Open Source | =13.7.0-rc1 | |
Asterisk Open Source | =13.8.0 | |
Asterisk Open Source | =13.8.0-rc1 | |
Asterisk Open Source | =13.8.1 | |
Asterisk Open Source | =13.8.2 | |
Asterisk Open Source | =13.9.0 | |
Asterisk Open Source | =13.9.0-rc1 | |
Asterisk Open Source | =13.10.0-rc1 | |
Asterisk Open Source | =13.11.0-rc1 | |
Asterisk Open Source | =13.12.0 | |
Asterisk Open Source | =13.12.0-rc1 | |
Asterisk Open Source | =13.12.1 | |
Asterisk Open Source | =13.12.2 | |
Asterisk Open Source | =13.13.0-rc1 | |
Asterisk Open Source | =13.14.0-rc1 | |
Asterisk Open Source | =13.15.0-rc1 | |
Asterisk Certified Asterisk | =13.13.0 | |
Asterisk Certified Asterisk | =13.13.0-cert1 | |
Asterisk Certified Asterisk | =13.13.0-cert1-rc1 | |
Asterisk Certified Asterisk | =13.13.0-cert1-rc2 | |
Asterisk Certified Asterisk | =13.13.0-cert1-rc3 | |
Asterisk Certified Asterisk | =13.13.0-cert1-rc4 | |
Asterisk Certified Asterisk | =13.13.0-cert2 | |
Asterisk Certified Asterisk | =13.13.0-cert3 | |
Asterisk Certified Asterisk | =13.13.0-rc1 | |
Asterisk Certified Asterisk | =13.13.0-rc2 | |
Asterisk Open Source | =14.0.0 | |
Asterisk Open Source | =14.0.0-beta1 | |
Asterisk Open Source | =14.0.0-beta2 | |
Asterisk Open Source | =14.0.0-rc1 | |
Asterisk Open Source | =14.1.0-rc1 | |
Asterisk Open Source | =14.2.0 | |
Asterisk Open Source | =14.2.0-rc1 | |
Asterisk Open Source | =14.2.0-rc2 | |
Asterisk Open Source | =14.2.1 | |
Asterisk Open Source | =14.3.0-rc1 | |
Asterisk Open Source | =14.4.0-rc1 | |
Sangoma Asterisk | =13.0.0 | |
Sangoma Asterisk | =13.1.0 | |
Sangoma Asterisk | =13.1.0-rc1 | |
Sangoma Asterisk | =13.1.0-rc2 | |
Sangoma Asterisk | =13.2.0 | |
Sangoma Asterisk | =13.2.0-rc1 | |
Sangoma Asterisk | =13.3.0-rc1 | |
Sangoma Asterisk | =13.4.0 | |
Sangoma Asterisk | =13.4.0-rc1 | |
Sangoma Asterisk | =13.5.0 | |
Sangoma Asterisk | =13.5.0-rc1 | |
Sangoma Asterisk | =13.6.0-rc1 | |
Sangoma Asterisk | =13.7.0 | |
Sangoma Asterisk | =13.7.0-rc1 | |
Sangoma Asterisk | =13.8.0 | |
Sangoma Asterisk | =13.8.0-rc1 | |
Sangoma Asterisk | =13.8.1 | |
Sangoma Asterisk | =13.8.2 | |
Sangoma Asterisk | =13.9.0 | |
Sangoma Asterisk | =13.9.0-rc1 | |
Sangoma Asterisk | =13.10.0-rc1 | |
Sangoma Asterisk | =13.11.0-rc1 | |
Sangoma Asterisk | =13.12.0 | |
Sangoma Asterisk | =13.12.0-rc1 | |
Sangoma Asterisk | =13.12.1 | |
Sangoma Asterisk | =13.12.2 | |
Sangoma Asterisk | =13.13.0-rc1 | |
Sangoma Asterisk | =13.14.0-rc1 | |
Sangoma Asterisk | =13.15.0-rc1 | |
Sangoma Asterisk | =14.0.0 | |
Sangoma Asterisk | =14.0.0-beta1 | |
Sangoma Asterisk | =14.0.0-beta2 | |
Sangoma Asterisk | =14.0.0-rc1 | |
Sangoma Asterisk | =14.1.0-rc1 | |
Sangoma Asterisk | =14.2.0 | |
Sangoma Asterisk | =14.2.0-rc1 | |
Sangoma Asterisk | =14.2.0-rc2 | |
Sangoma Asterisk | =14.2.1 | |
Sangoma Asterisk | =14.3.0-rc1 | |
Sangoma Asterisk | =14.4.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.