{"id":"CVE-2011-2529","details":"chan_sip.c in the SIP channel driver in Asterisk Open Source 1.6.x before 1.6.2.18.1 and 1.8.x before 1.8.4.3 does not properly handle '\\0' characters in SIP packets, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted packet.","modified":"2026-01-27T04:10:50.945871Z","published":"2011-07-06T19:55:03Z","withdrawn":"2026-01-27T04:10:50.945871Z","references":[{"type":"ADVISORY","url":"http://downloads.asterisk.org/pub/security/AST-2011-008.html"},{"type":"ADVISORY","url":"http://secunia.com/advisories/45048"},{"type":"ADVISORY","url":"http://secunia.com/advisories/45201"},{"type":"ADVISORY","url":"http://secunia.com/advisories/45239"},{"type":"ADVISORY","url":"http://www.debian.org/security/2011/dsa-2276"},{"type":"FIX","url":"http://downloads.asterisk.org/pub/security/AST-2011-008.diff"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062628.html"},{"type":"WEB","url":"http://securitytracker.com/id?1025706"},{"type":"WEB","url":"http://www.osvdb.org/73307"},{"type":"WEB","url":"http://www.securityfocus.com/bid/48431"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/68203"}],"schema_version":"1.7.3"}