Executive Summary

Informations
Name CVE-2014-8416 First vendor Publication 2014-11-24
Vendor Cve Last vendor Modification 2019-07-16

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Use-after-free vulnerability in the PJSIP channel driver in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1, when using the res_pjsip_refer module, allows remote attackers to cause a denial of service (crash) via an in-dialog INVITE with Replaces message, which triggers the channel to be hung up.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8416

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 808

Nessus® Vulnerability Scanner

Date Description
2014-11-25 Name : A telephony application running on the remote host is affected by multiple vu...
File : asterisk_ast_2014_013.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
CONFIRM http://downloads.asterisk.org/pub/security/AST-2014-016.html

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
Date Informations
2024-02-16 12:26:14
  • Multiple Updates
2021-05-05 01:16:40
  • Multiple Updates
2021-05-04 12:35:58
  • Multiple Updates
2021-04-22 01:43:27
  • Multiple Updates
2020-05-23 01:53:37
  • Multiple Updates
2020-05-23 00:42:41
  • Multiple Updates
2019-07-16 17:19:27
  • Multiple Updates
2018-10-30 12:07:15
  • Multiple Updates
2017-09-21 12:01:39
  • Multiple Updates
2017-01-04 12:01:02
  • Multiple Updates
2016-04-27 01:24:55
  • Multiple Updates
2014-11-26 13:28:22
  • Multiple Updates
2014-11-26 00:24:49
  • Multiple Updates
2014-11-24 21:26:37
  • First insertion