Unrated severityNVD Advisory· Published Apr 18, 2014· Updated May 6, 2026
CVE-2014-2288
CVE-2014-2288
Description
The PJSIP channel driver in Asterisk Open Source 12.x before 12.1.1, when qualify_frequency "is enabled on an AOR and the remote SIP server challenges for authentication of the resulting OPTIONS request," allows remote attackers to cause a denial of service (crash) via a PJSIP endpoint that does not have an associated outgoing request.
Affected products
5cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:12.1.0:-:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- downloads.asterisk.org/pub/security/AST-2014-003-12.diffnvdPatch
- downloads.asterisk.org/pub/security/AST-2014-003.htmlnvdVendor Advisory
- lists.fedoraproject.org/pipermail/package-announce/2014-March/130400.htmlnvd
- lists.fedoraproject.org/pipermail/package-announce/2014-March/130426.htmlnvd
- issues.asterisk.org/jira/browse/ASTERISK-23210nvd
News mentions
0No linked articles in our index yet.