DEBIAN-CVE-2012-3863

Source
https://security-tracker.debian.org/tracker/CVE-2012-3863
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2012-3863.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2012-3863
Upstream
Published
2012-07-09T10:20:44Z
Modified
2025-09-19T06:06:02Z
Summary
[none]
Details

channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.13.1 and 10.x before 10.5.2, Asterisk Business Edition C.3.x before C.3.7.5, Certified Asterisk 1.8.11-certx before 1.8.11-cert4, and Asterisk Digiumphones 10.x.x-digiumphones before 10.5.2-digiumphones does not properly handle a provisional response to a SIP reINVITE request, which allows remote authenticated users to cause a denial of service (RTP port exhaustion) via sessions that lack final responses.

References

Affected packages

Debian:11 / asterisk

Package

Name
asterisk
Purl
pkg:deb/debian/asterisk?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:1.8.13.1~dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}