Vulnerability Details : CVE-2009-2651
main/rtp.c in Asterisk Open Source 1.6.1 before 1.6.1.2 allows remote attackers to cause a denial of service (crash) via an RTP text frame without a certain delimiter, which triggers a NULL pointer dereference and the subsequent calculation of an invalid pointer.
Vulnerability category: Memory CorruptionDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2009-2651
Probability of exploitation activity in the next 30 days: 9.19%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 94 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2009-2651
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2009-2651
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-2651
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/52046
-
http://downloads.asterisk.org/pub/security/AST-2009-004.html
Vendor Advisory
-
http://www.securitytracker.com/id?1022608
-
http://www.vupen.com/english/advisories/2009/2067
Patch;Vendor Advisory
-
http://www.securityfocus.com/bid/35837
-
http://downloads.digium.com/pub/security/AST-2009-004-1.6.1.diff.txt
Exploit
Products affected by CVE-2009-2651
- cpe:2.3:a:digium:asterisk:1.6.1:*:*:*:*:*:*:*