CVE-2014-2287
Description
channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.26.1, 11.8.x before 11.8.1, and 12.1.x before 12.1.1, and Certified Asterisk 1.8.15 before 1.8.15-cert5 and 11.6 before 11.6-cert2, when chan_sip has a certain configuration, allows remote authenticated users to cause a denial of service (channel and file descriptor consumption) via an INVITE request with a (1) Session-Expires or (2) Min-SE header with a malformed or invalid value.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Asterisk chan_sip leaks file descriptors via malformed Session-Expires/Min-SE headers, enabling remote authenticated denial-of-service.
Vulnerability
In channels/chan_sip.c of Asterisk Open Source 1.8.x before 1.8.26.1, 11.8.x before 11.8.1, and 12.1.x before 12.1.1, and Certified Asterisk 1.8.15 before 1.8.15-cert5 and 11.6 before 11.6-cert2, a malformed or invalid Session-Expires or Min-SE header in an INVITE request causes the channel and associated file descriptors to be leaked rather than properly released. The vulnerability is reachable when chan_sip is configured with session-timers set to originate or accept (and the INVITE contains a malformed Session-Expires or Min-SE header) or when session-timers is set to refuse and the INVITE offers timer in the Supported header [1][2].
Exploitation
An attacker needs valid SIP account credentials or anonymous dial-in, plus knowledge of a valid extension that can be dialed from that account [2]. The attacker sends crafted INVITE requests that trigger an error response (400, 420, or 422). Each such INVITE leaks a channel and multiple file descriptors (including RTP/RTCP sockets) that remain unreleased until Asterisk is restarted [1][2]. The leak can be exploited slowly over time to bypass intrusion detection systems [2].
Impact
A remote authenticated attacker can exhaust all available file descriptors on the Asterisk system, leading to a denial-of-service condition where legitimate calls and other services are denied. File descriptors cannot be freed without restarting Asterisk [1][2]. The attack does not require sophisticated network position or race conditions.
Mitigation
Upgrade to Asterisk Open Source 1.8.26.1, 11.8.1, 12.1.1, or Certified Asterisk 1.8.15-cert5 or 11.6-cert2 as applicable [1][2]. The patch moves the session-timers validation before sip_new allocation to prevent the leak [1]. If an immediate upgrade is not possible, users may restrict SIP account permissions or disable session-timers functionality, but this is not a full substitute for the fix.
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
234cpe:2.3:a:digium:asterisk:11.8.0:-:*:*:*:*:*:*+ 155 more
- cpe:2.3:a:digium:asterisk:11.8.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:11.8.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:11.8.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:11.8.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:12.1.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.10.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.10.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.10.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.10.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.10.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.10.0:rc4:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.11.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.11.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.11.0:patch:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.11.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.11.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.11.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.11.1:-:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.11.1:patch:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.12:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.12.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.12.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.12.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.12.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.12.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.12.2:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.13.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.13.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.13.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.13.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.14.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.14.0:patch:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.14.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.14.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.14.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.14.1:-:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.14.1:patch:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.15.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.15.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.15.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.15.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.16.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.16.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.16.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.16.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.17.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.17.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.17.0:patch:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.17.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.17.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.17.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.18.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.18.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.18.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.18.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.19.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.19.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.19.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.19.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.19.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.20.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.20.0:patch:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.20.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.20.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.20.1:-:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.20.1:patch:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.20.2:-:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.20.2:patch:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.21.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.21.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.21.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.22.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.22.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.22.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.23.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.23.0:patch:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.23.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.23.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.23.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.24.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.24.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.24.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.24.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.25.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.25.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.25.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.26.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.26.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.8.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.8.0:patch:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.8.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.8.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.8.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.8.0:rc4:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.8.0:rc5:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.9.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.9.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.9.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.9.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.9.3:*:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:11.6.0:-:*:*:*:*:*:*+ 73 more
- cpe:2.3:a:digium:certified_asterisk:11.6.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:11.6.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:11.6.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.0.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta4:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta5:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc4:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc5:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.1.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.10.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc4:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.1.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.11.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.11.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.11.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.11.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.12.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.12.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.12.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.12.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.13.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.13.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.13.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.14.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.14.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.15:-:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1_rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1_rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1_rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.15:cert2:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.15:cert3:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.15:cert4:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.2.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.2.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.3.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.3.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.3.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.3.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.4.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.4.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.4.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.4.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.5.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.5.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.6.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.6.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.6.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.6.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.7.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.7.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.7.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.8.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc4:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc5:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.9.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.9.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.9.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:certified_asterisk:1.8.9.0:rc3:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
- Range: 1.8.15 < 1.8.15-cert5; 11.6 < 11.6-cert2
- Range: 1.8.x < 1.8.26.1; 11.8.x < 11.8.1; 12.1.x < 12.1.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- downloads.asterisk.org/pub/security/AST-2014-002-1.8.diffnvdPatch
- downloads.asterisk.org/pub/security/AST-2014-002.htmlnvdPatchVendor Advisory
- lists.fedoraproject.org/pipermail/package-announce/2014-March/130400.htmlnvd
- lists.fedoraproject.org/pipermail/package-announce/2014-March/130426.htmlnvd
- www.mandriva.com/security/advisoriesnvd
- www.securityfocus.com/bid/66094nvd
- issues.asterisk.org/jira/browse/ASTERISK-23373nvd
News mentions
0No linked articles in our index yet.