Digium Asterisk SIP Channel Driver Denial Of Service - High Confidence (CVE-2011-4063)
| Check Point Reference: | CPAI-2013-1624 | |
| Date Published: | ||
| Severity: | ||
| Source: | Secunia | |
| Industry Reference(s): | CVE-2011-4063 |
|
| Protection Provided by: |
Security Gateway
|
|
|
Who is Vulnerable? Digium Asterisk Open Source 1.8 prior to 1.8.7.1 Digium Asterisk Open Source 10.x |
||
| Vulnerability Description A denial of service vulnerability has been reported in Digium Asterisk. |
||
|
Vulnerability Details The vulnerability is due to an error in Asterisk's SIP channel driver while handling malformed REGISTER requests. A remote attacker may exploit this vulnerability by sending a specially crafted REGISTER request to an affected Asterisk server. Successful exploitation could cause the application to crash, resulting in a denial of service condition. |
Protection Overview
This protection will detect and block the transferring of a malicious SIP request.
In order for the protection to be activated, update your product to the latest update. For information on how to update , go to SBP-2006-05, Protection tab and select the version of your choice.
To configure the defense, select your product from the list below and follow the related protection steps.