No analysis available yet.
Default status is the baseline for the product, each version can override it (e.g. patched versions marked unaffected).
| Vendor | Product | Default status | Versions | ||||||
|---|---|---|---|---|---|---|---|---|---|
| n/a | n/a | affected |
|
Configuration 1 [-]
|
No data.
No data available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-3700-1 | asterisk security update |
EUVD |
EUVD-2016-3316 | Asterisk Open Source 1.8.x, 11.x before 11.21.1, 12.x, and 13.x before 13.7.1 and Certified Asterisk 1.8.28, 11.6 before 11.6-cert12, and 13.1 before 13.1-cert3 allow remote authenticated users to cause a denial of service (uninitialized pointer dereference and crash) via a zero length error correcting redundancy packet for a UDPTL FAX packet that is lost. |
No CVSS v4.0
No CVSS v3.1
Attack Vector Network
Attack Complexity Low
Privileges Required Low
Scope Unchanged
Confidentiality Impact None
Integrity Impact None
Availability Impact High
User Interaction None
Access Vector Network
Access Complexity Low
Authentication Single
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
This CVE is not in the KEV list.
The EPSS score is 0.07852.
Key SSVC decision points have not yet been added.
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T23:24:48.950Z
Reserved: 2016-02-07T00:00:00.000Z
Link: CVE-2016-2232
No data.
Status : Deferred
Published: 2016-02-22T15:59:01.190
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-2232
No data.
OpenCVE Enrichment
No data.
Debian DSA
EUVD