Vulnerability identifier: #VU32791
Vulnerability risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2012-2416
CWE-ID:
CWE-119
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Asterisk Open Source
Server applications /
Conferencing, Collaboration and VoIP solutions
Vendor: Digium (Linux Support Services)
Description
The vulnerability allows a remote #AU# to read and manipulate data.
chan_sip.c in the SIP channel driver in Asterisk Open Source 1.8.x before 1.8.11.1 and 10.x before 10.3.1 and Asterisk Business Edition C.3.x before C.3.7.4, when the trustrpid option is enabled, allows remote authenticated users to cause a denial of service (daemon crash) by sending a SIP UPDATE message that triggers a connected-line update attempt without an associated channel.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Asterisk Open Source: 10.3.0
External links
https://downloads.asterisk.org/pub/security/AST-2012-006.html
https://lists.fedoraproject.org/pipermail/package-announce/2012-May/079759.html
https://osvdb.org/81456
https://secunia.com/advisories/48891
https://www.securityfocus.com/bid/53205
https://www.securitytracker.com/id?1026963
https://exchange.xforce.ibmcloud.com/vulnerabilities/75101
https://issues.asterisk.org/jira/browse/ASTERISK-19770
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.