Description
channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.26.1, 11.8.x before 11.8.1, and 12.1.x before 12.1.1, and Certified Asterisk 1.8.15 before 1.8.15-cert5 and 11.6 before 11.6-cert2, when chan_sip has a certain configuration, allows remote authenticated users to cause a denial of service (channel and file descriptor consumption) via an INVITE request with a (1) Session-Expires or (2) Min-SE header with a malformed or invalid value.
Published: 2014-04-18
Score: 3.5 Low
EPSS: 5.2% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-781-1 asterisk security update
Debian DLA Debian DLA DLA-781-2 asterisk regression update
History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.27885}

epss

{'score': 0.22862}


Subscriptions

Digium Asterisk Certified Asterisk
Fedoraproject Fedora
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T10:06:00.091Z

Reserved: 2014-03-05T00:00:00.000Z

Link: CVE-2014-2287

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-04-18T22:14:38.010

Modified: 2025-04-12T10:46:40.837

Link: CVE-2014-2287

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses