Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2014-4045
Deferred
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-17 Jun, 2014 | 14:55
Updated At-12 Apr, 2025 | 10:46

The Publish/Subscribe Framework in the PJSIP channel driver in Asterisk Open Source 12.x before 12.3.1, when sub_min_expiry is set to zero, allows remote attackers to cause a denial of service (assertion failure and crash) via an unsubscribe request when not subscribed to the device.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
CPE Matches

Digium, Inc.
digium
>>asterisk>>12.0.0
cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>12.1.0
cpe:2.3:a:digium:asterisk:12.1.0:-:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>12.1.0
cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>12.1.0
cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>12.1.0
cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>12.1.1
cpe:2.3:a:digium:asterisk:12.1.1:*:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>12.2.0
cpe:2.3:a:digium:asterisk:12.2.0:*:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>12.2.0
cpe:2.3:a:digium:asterisk:12.2.0:rc1:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>12.2.0
cpe:2.3:a:digium:asterisk:12.2.0:rc2:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>12.2.0
cpe:2.3:a:digium:asterisk:12.2.0:rc3:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>12.3.0
cpe:2.3:a:digium:asterisk:12.3.0:*:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>12.3.0
cpe:2.3:a:digium:asterisk:12.3.0:rc1:*:*:*:*:*:*
Digium, Inc.
digium
>>asterisk>>12.3.0
cpe:2.3:a:digium:asterisk:12.3.0:rc2:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-189Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://downloads.asterisk.org/pub/security/AST-2014-005.htmlcve@mitre.org
Patch
Vendor Advisory
http://packetstormsecurity.com/files/127087/Asterisk-Project-Security-Advisory-AST-2014-005.htmlcve@mitre.org
N/A
http://www.securityfocus.com/archive/1/532414/100/0/threadedcve@mitre.org
N/A
http://downloads.asterisk.org/pub/security/AST-2014-005.htmlaf854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
http://packetstormsecurity.com/files/127087/Asterisk-Project-Security-Advisory-AST-2014-005.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/archive/1/532414/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
N/A
Change History
0Changes found

Details not found