CVE-2018-12228
An issue was discovered in Asterisk Open Source 15.x before 15.4.1. When connected to Asterisk via TCP/TLS, if the client abruptly disconnects, or sends a specially crafted message, then Asterisk gets caught in an infinite loop while trying to read the data stream. This renders the system unusable.
Published
2018-06-12T04:29:00.330
Last Modified
2024-11-21T03:44:49.210
Status
Modified
Source
[email protected]
Severity
CVSSv3.0: 6.5 (MEDIUM)
CVSSv2 Vector
AV:N/AC:L/Au:S/C:N/I:N/A:C
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: SINGLE
- Confidentiality Impact: NONE
- Integrity Impact: NONE
- Availability Impact: COMPLETE
Exploitability Score
8.0
Impact Score
6.9
Weaknesses
Affected Vendors & Products
| Type |
Vendor |
Product |
Version/Range |
Vulnerable? |
| Application |
sangoma
|
asterisk
|
< 15.4.1 |
Yes
|
References