#VU32791 Buffer overflow in Asterisk Open Source - CVE-2012-2416


| Updated: 2020-07-28

Vulnerability identifier: #VU32791

Vulnerability risk: Low

CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2012-2416

CWE-ID: CWE-119

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Asterisk Open Source
Server applications / Conferencing, Collaboration and VoIP solutions

Vendor: Digium (Linux Support Services)

Description

The vulnerability allows a remote #AU# to read and manipulate data.

chan_sip.c in the SIP channel driver in Asterisk Open Source 1.8.x before 1.8.11.1 and 10.x before 10.3.1 and Asterisk Business Edition C.3.x before C.3.7.4, when the trustrpid option is enabled, allows remote authenticated users to cause a denial of service (daemon crash) by sending a SIP UPDATE message that triggers a connected-line update attempt without an associated channel.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Asterisk Open Source: 10.3.0


External links
https://downloads.asterisk.org/pub/security/AST-2012-006.html
https://lists.fedoraproject.org/pipermail/package-announce/2012-May/079759.html
https://osvdb.org/81456
https://secunia.com/advisories/48891
https://www.securityfocus.com/bid/53205
https://www.securitytracker.com/id?1026963
https://exchange.xforce.ibmcloud.com/vulnerabilities/75101
https://issues.asterisk.org/jira/browse/ASTERISK-19770


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability