The SIP channel driver in Asterisk Open Source 1.4.22, 1.4.23, and 1.4.23.1; 1.6.0 before 1.6.0.6; 1.6.1 before 1.6.1.0-rc2; and Asterisk Business Edition C.2.3, with the pedantic option enabled, allows remote authenticated users to cause a denial of service (crash) via a SIP INVITE request without any headers, which triggers a NULL pointer dereference in the (1) sip_uri_headers_cmp and (2) sip_uri_params_cmp functions.
                
            References
                    Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    21 Nov 2024, 01:01
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://bugs.digium.com/view.php?id=13547 - | |
| References | () http://bugs.digium.com/view.php?id=14417 - | |
| References | () http://downloads.digium.com/pub/security/AST-2009-002.html - Patch, Vendor Advisory | |
| References | () http://osvdb.org/52568 - | |
| References | () http://secunia.com/advisories/34229 - Vendor Advisory | |
| References | () http://www.securityfocus.com/archive/1/501656/100/0/threaded - | |
| References | () http://www.securityfocus.com/bid/34070 - Patch | |
| References | () http://www.securitytracker.com/id?1021834 - | |
| References | () http://www.vupen.com/english/advisories/2009/0667 - | 
Information
                Published : 2009-03-11 14:19
Updated : 2025-04-09 00:30
NVD link : CVE-2009-0871
Mitre link : CVE-2009-0871
CVE.ORG link : CVE-2009-0871
JSON object : View
Products Affected
                digium
- asterisk
 
CWE
                
                    
                        
                        CWE-20
                        
            Improper Input Validation
