Unrated severityNVD Advisory· Published Sep 9, 2013· Updated Apr 29, 2026
CVE-2013-5642
CVE-2013-5642
Description
The SIP channel driver (channels/chan_sip.c) in Asterisk Open Source 1.8.x before 1.8.23.1, 10.x before 10.12.3, and 11.x before 11.5.1; Certified Asterisk 1.8.15 before 1.8.15-cert3 and 11.2 before 11.2-cert2; and Asterisk Digiumphones 10.x-digiumphones before 10.12.3-digiumphones allows remote attackers to cause a denial of service (NULL pointer dereference, segmentation fault, and daemon crash) via an invalid SDP that defines a media description before the connection description in a SIP request.
Affected products
81cpe:2.3:a:digium:asterisk_digiumphones:10.12.0:*:*:*:*:*:*:*+ 11 more
- cpe:2.3:a:digium:asterisk_digiumphones:10.12.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk_digiumphones:10.12.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk_digiumphones:10.12.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk_digiumphones:10.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk_digiumphones:10.12.2:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk_digiumphones:10.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk_digiumphones:10.0.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk_digiumphones:10.0.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk_digiumphones:10.11.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk_digiumphones:10.11.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk_digiumphones:10.11.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk_digiumphones:10.11.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:1.8.15:*:*:*:*:*:*:*+ 10 more
- cpe:2.3:a:digium:certified_asterisk:1.8.15:*:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1-rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1-rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1-rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.15:cert2:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.15:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:11.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:11.2.0:cert1:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:11.2.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:11.2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.17.0:*:*:*:*:*:*:*+ 57 more
- cpe:2.3:a:digium:asterisk:1.8.17.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.17.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.17.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.17.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.18.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.18.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.18.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.19.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.19.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.19.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.19.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.20.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.20.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.20.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.21.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.21.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.22.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.22.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.22.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.23.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.23.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.23.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:10.10.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:10.10.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:10.10.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:10.11.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:10.11.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:10.11.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:10.11.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:10.12.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:10.12.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:10.12.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:10.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:10.12.2:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:11.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:11.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:11.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:11.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:11.2.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:11.2.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:11.3.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:11.3.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:11.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:11.4.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:11.4.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:11.4.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:11.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:11.5.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:11.5.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:11.5.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- downloads.asterisk.org/pub/security/AST-2013-005.htmlnvdPatchVendor Advisory
- secunia.com/advisories/54534nvdVendor Advisory
- archives.neohapsis.com/archives/bugtraq/2013-08/0174.htmlnvd
- osvdb.org/96690nvd
- secunia.com/advisories/54617nvd
- www.debian.org/security/2013/dsa-2749nvd
- www.mandriva.com/security/advisoriesnvd
- www.securityfocus.com/bid/62022nvd
- www.securitytracker.com/id/1028957nvd
- issues.asterisk.org/jira/browse/ASTERISK-22007nvd
News mentions
0No linked articles in our index yet.