VYPR
Unrated severityNVD Advisory· Published Apr 18, 2014· Updated May 6, 2026

CVE-2014-2287

CVE-2014-2287

Description

channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.26.1, 11.8.x before 11.8.1, and 12.1.x before 12.1.1, and Certified Asterisk 1.8.15 before 1.8.15-cert5 and 11.6 before 11.6-cert2, when chan_sip has a certain configuration, allows remote authenticated users to cause a denial of service (channel and file descriptor consumption) via an INVITE request with a (1) Session-Expires or (2) Min-SE header with a malformed or invalid value.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Asterisk chan_sip leaks file descriptors via malformed Session-Expires/Min-SE headers, enabling remote authenticated denial-of-service.

Vulnerability

In channels/chan_sip.c of Asterisk Open Source 1.8.x before 1.8.26.1, 11.8.x before 11.8.1, and 12.1.x before 12.1.1, and Certified Asterisk 1.8.15 before 1.8.15-cert5 and 11.6 before 11.6-cert2, a malformed or invalid Session-Expires or Min-SE header in an INVITE request causes the channel and associated file descriptors to be leaked rather than properly released. The vulnerability is reachable when chan_sip is configured with session-timers set to originate or accept (and the INVITE contains a malformed Session-Expires or Min-SE header) or when session-timers is set to refuse and the INVITE offers timer in the Supported header [1][2].

Exploitation

An attacker needs valid SIP account credentials or anonymous dial-in, plus knowledge of a valid extension that can be dialed from that account [2]. The attacker sends crafted INVITE requests that trigger an error response (400, 420, or 422). Each such INVITE leaks a channel and multiple file descriptors (including RTP/RTCP sockets) that remain unreleased until Asterisk is restarted [1][2]. The leak can be exploited slowly over time to bypass intrusion detection systems [2].

Impact

A remote authenticated attacker can exhaust all available file descriptors on the Asterisk system, leading to a denial-of-service condition where legitimate calls and other services are denied. File descriptors cannot be freed without restarting Asterisk [1][2]. The attack does not require sophisticated network position or race conditions.

Mitigation

Upgrade to Asterisk Open Source 1.8.26.1, 11.8.1, 12.1.1, or Certified Asterisk 1.8.15-cert5 or 11.6-cert2 as applicable [1][2]. The patch moves the session-timers validation before sip_new allocation to prevent the leak [1]. If an immediate upgrade is not possible, users may restrict SIP account permissions or disable session-timers functionality, but this is not a full substitute for the fix.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

234
  • Digium/Asterisk156 versions
    cpe:2.3:a:digium:asterisk:11.8.0:-:*:*:*:*:*:*+ 155 more
    • cpe:2.3:a:digium:asterisk:11.8.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:11.8.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:11.8.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:11.8.0:rc3:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:12.1.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.10.0:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.10.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.10.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.10.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.10.0:rc3:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.10.0:rc4:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.10.1:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.11.0:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.11.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.11.0:patch:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.11.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.11.0:rc3:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.11.1:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.11.1:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.11.1:patch:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.12:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.12.0:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.12.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.12.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.12.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.12.0:rc3:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.12.1:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.12.2:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.13.0:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.13.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.13.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.13.1:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.14.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.14.0:patch:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.14.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.14.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.14.1:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.14.1:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.14.1:patch:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.15.0:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.15.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.15.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.15.1:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.16.0:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.16.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.16.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.16.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.17.0:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.17.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.17.0:patch:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.17.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.17.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.17.0:rc3:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.18.0:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.18.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.18.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.18.1:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.19.0:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.19.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.19.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.19.0:rc3:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.19.1:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.20.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.20.0:patch:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.20.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.20.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.20.1:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.20.1:patch:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.20.2:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.20.2:patch:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.21.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.21.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.21.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.22.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.22.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.22.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.23.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.23.0:patch:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.23.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.23.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.23.1:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.24.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.24.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.24.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.24.1:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.25.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.25.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.25.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.26.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.26.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.8.0:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.8.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.8.0:patch:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.8.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.8.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.8.0:rc3:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.8.0:rc4:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.8.0:rc5:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.8.1:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.8.2:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.9.0:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.9.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.9.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.9.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.9.0:rc3:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.9.1:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.9.2:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.9.3:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:certified_asterisk:11.6.0:-:*:*:*:*:*:*+ 73 more
    • cpe:2.3:a:digium:certified_asterisk:11.6.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:11.6.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:11.6.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.0.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta1:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta2:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta3:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta4:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta5:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc3:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc4:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc5:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.1.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.10.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc3:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc4:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.1.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.11.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.11.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.11.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.11.0:rc3:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.12.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.12.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.12.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.12.0:rc3:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.13.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.13.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.13.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.14.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.14.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.15:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1_rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1_rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1_rc3:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.15:cert2:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.15:cert3:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.15:cert4:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.2.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.2.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.3.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.3.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.3.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.3.0:rc3:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.4.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.4.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.4.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.4.0:rc3:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.5.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.5.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.6.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.6.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.6.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.6.0:rc3:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.7.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.7.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.7.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.8.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc3:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc4:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc5:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.9.0:-:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.9.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.9.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:certified_asterisk:1.8.9.0:rc3:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
    • cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
  • Range: 1.8.15 < 1.8.15-cert5; 11.6 < 11.6-cert2
  • Range: 1.8.x < 1.8.26.1; 11.8.x < 11.8.1; 12.1.x < 12.1.1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.