Description
Asterisk Open Source 1.8.x, 11.x before 11.21.1, 12.x, and 13.x before 13.7.1 and Certified Asterisk 1.8.28, 11.6 before 11.6-cert12, and 13.1 before 13.1-cert3 allow remote authenticated users to cause a denial of service (uninitialized pointer dereference and crash) via a zero length error correcting redundancy packet for a UDPTL FAX packet that is lost.
Published: 2016-02-22
Score: 6.5 Medium
EPSS: 7.9% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-3700-1 asterisk security update
EUVD EUVD EUVD-2016-3316 Asterisk Open Source 1.8.x, 11.x before 11.21.1, 12.x, and 13.x before 13.7.1 and Certified Asterisk 1.8.28, 11.6 before 11.6-cert12, and 13.1 before 13.1-cert3 allow remote authenticated users to cause a denial of service (uninitialized pointer dereference and crash) via a zero length error correcting redundancy packet for a UDPTL FAX packet that is lost.
History

No history.

Subscriptions

Digium Asterisk Certified Asterisk
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T23:24:48.950Z

Reserved: 2016-02-07T00:00:00.000Z

Link: CVE-2016-2232

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2016-02-22T15:59:01.190

Modified: 2025-04-12T10:46:40.837

Link: CVE-2016-2232

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses