chain_sip in Asterisk Open Source 11.x before 11.23.1 and 13.x 13.11.1 and Certified Asterisk 11.6 before 11.6-cert15 and 13.8 before 13.8-cert3 allows remote attackers to cause a denial of service (port exhaustion).
References
Link | Resource |
---|---|
https://issues.asterisk.org/jira/browse/ASTERISK-26272 | Issue Tracking Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1374733 | Issue Tracking Patch |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838832 | Issue Tracking Patch Third Party Advisory |
http://www.debian.org/security/2016/dsa-3700 | Third Party Advisory |
http://downloads.asterisk.org/pub/security/AST-2016-007.html | Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2017-04-17 09:59
Updated : 2017-04-24 17:39
NVD link : CVE-2016-7551
Mitre link : CVE-2016-7551
JSON object : View
CWE
CWE-399
Resource Management Errors
Products Affected
digium
- certified_asterisk
- asterisk
debian
- debian_linux