CVE-2012-3863

Source
https://nvd.nist.gov/vuln/detail/CVE-2012-3863
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2012-3863.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2012-3863
Downstream
Published
2012-07-09T10:20:44Z
Modified
2025-04-11T00:51:21Z
Summary
[none]
Details

channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.13.1 and 10.x before 10.5.2, Asterisk Business Edition C.3.x before C.3.7.5, Certified Asterisk 1.8.11-certx before 1.8.11-cert4, and Asterisk Digiumphones 10.x.x-digiumphones before 10.5.2-digiumphones does not properly handle a provisional response to a SIP reINVITE request, which allows remote authenticated users to cause a denial of service (RTP port exhaustion) via sessions that lack final responses.

References

Affected packages

Debian:11 / asterisk

Package

Name
asterisk
Purl
pkg:deb/debian/asterisk?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:1.8.13.1~dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}