Vulnerabilites related to asterisk - asterisknow
Vulnerability from fkie_nvd
Published
2008-04-23 16:05
Modified
2024-11-21 00:45
Severity ?
Summary
The IAX2 channel driver (chan_iax2) in Asterisk 1.2 before revision 72630 and 1.4 before revision 65679, when configured to allow unauthenticated calls, sends "early audio" to an unverified source IP address of a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed NEW message.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*", "matchCriteriaId": "2140AF01-7079-4433-AF28-45E767E59AD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*", "matchCriteriaId": "C58BA442-8E36-492B-9700-B20B469190F4", "versionEndIncluding": "b2.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*", "matchCriteriaId": "267F32ED-B9E4-4454-99C1-F445E52EE96F", "versionEndIncluding": "c1.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:a:*:*:*:*:*:*:*", "matchCriteriaId": "313B3A38-8DEA-4D62-A1A4-0B6011E81870", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "802F8680-AB38-41AF-BFC8-F6927F6B1626", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "BCAE8D90-B032-4C60-B487-BE655D00FFAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "AB64A872-B7B8-46A8-81E4-49EDAC160531", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "21000270-C9B9-430C-A252-763887A15835", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "12F7CF45-5482-4947-8F1D-48C746987475", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "7B64995D-7892-49AB-A89D-A5D15615C5D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "0397DBD4-EA00-444A-9008-4932F99DF325", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "6FCD865F-BC39-4255-A797-6E5945773337", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E4956871-4DD3-4299-8BEB-9D98A4449A42", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta7:*:*:*:*:*:*:*", "matchCriteriaId": "5BC80EBD-14D3-44A6-A06F-0549722E0EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta8:*:*:*:*:*:*:*", "matchCriteriaId": "7859797F-E9AD-4429-BD2C-A24EC24A5D03", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0beta7:*:*:*:*:*:*:*", "matchCriteriaId": "34FAE6AC-1C98-42E0-A5D4-5EA17ED325A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "00A6DAD0-D4C3-4A58-A35A-991E04B50EC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:*:*:*:*:*:*:*:*", "matchCriteriaId": "272DE03B-1470-45FF-A31B-2CE44A8E8378", "versionEndIncluding": "1.0.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CC6FE17C-3B08-4675-9F73-5DC0C2438BB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0D8AB81C-3DCF-42E9-8022-2F7135022C73", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "678DB154-4363-42FF-8B28-367923FC6595", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "E8F2C378-FF0E-4765-9F66-625C4064D5CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "A55A9295-F632-4856-90A1-38371EB98589", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7FAE6AF1-884D-41F7-B174-9E13C7719C99", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DCA9E35B-9A6B-42F2-9315-9C7D09F62227", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DDF7EC20-A424-45E5-B7E4-3CC86075858C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "C790E105-55C8-4CDC-9FA8-E1FF6F130A67", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "44C860EF-2B29-4995-B942-000CC43FDD14", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "1ADB80EF-C724-44BA-88FC-24087799D0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "78B39BE8-7E2D-42DF-8633-44CAD5662777", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "F39036E3-0027-4C72-9DEB-9A6E2B4512C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "A037E6F9-3EF7-4EEB-AC16-081421BCE40D", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "6A7EC02A-9C9E-4589-BBB3-1908D3078A7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "6C70FA9C-6F3B-4BDF-97FB-81D06AB0EE65", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9F7971E1-F136-4ADC-95EC-BC4F92E838CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "27202966-2C41-4964-9497-1887D2A834C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1471B5A2-15BE-4E7C-BA49-2E6002F7C8EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "7108D72F-5AFD-4EEF-B2A9-CA4FA792E193", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.3:netsec:*:*:*:*:*:*", "matchCriteriaId": "DC7EB4CD-6436-4E0B-A620-9DF2AC8A3C66", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "107DA2D8-FE7C-4B70-856D-43D58B988694", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.4:netsec:*:*:*:*:*:*", "matchCriteriaId": "02D5E6DF-7C9C-479F-986B-D5C8A144ACB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "ABD71DD9-8A15-45E2-9FB3-F0544D7E1B80", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.5:netsec:*:*:*:*:*:*", "matchCriteriaId": "68AF6200-1385-449F-A00E-2BACEE16450B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "5C14614F-4E27-40A6-9E56-2B1DBB10330B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.6:netsec:*:*:*:*:*:*", "matchCriteriaId": "61C0769F-6739-41D2-ADD8-924AC04C5F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "7A2F2F5A-66FD-4057-917C-66332A88D83E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7:netsec:*:*:*:*:*:*", "matchCriteriaId": "8EF13987-5767-4FED-9584-63D74B0A30A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "399B0206-B48B-46EF-8CA6-A6E5A2550B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7.1:netsec:*:*:*:*:*:*", "matchCriteriaId": "C57C1324-E11A-4B2B-9722-A4A63AEF0497", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "26E9760F-C0EB-47BB-8DA4-CC7815099DAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.8:netsec:*:*:*:*:*:*", "matchCriteriaId": "EE6D9718-D57D-48F6-A2B1-CECAFFCDDFB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "4C510A9A-C3E2-4AF8-9919-1A22E918CDEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "6BD915CD-A7D3-4305-A6C0-290C648A226C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.9.1:netsec:*:*:*:*:*:*", "matchCriteriaId": "3249AB40-2058-42E9-9A33-64E434E5BB64", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "9E79CCE5-C29B-4726-8D2F-BC20F70959BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.10:netsec:*:*:*:*:*:*", "matchCriteriaId": "0CF6584D-A7BB-4BD5-8232-9293FEE4A971", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "F29C13DB-6F04-4B41-90A2-2408D70F3641", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.11:netsec:*:*:*:*:*:*", "matchCriteriaId": "174D6B56-7D0F-46F0-849A-FD05CB348FAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "0F4F734E-0E78-4957-B323-8E9FBA7FF15C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.12:netsec:*:*:*:*:*:*", "matchCriteriaId": "938F545A-F8A7-455E-8E5A-2B5454B6CE53", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A4B117B-E945-4033-A79D-10DFAA3DF18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EA6D866F-8189-4FFD-AA24-47C0A015C246", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.13:netsec:*:*:*:*:*:*", "matchCriteriaId": "B2BAA1B3-7DD3-4248-915D-2BCC0ACFA2C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "A4EBFB79-C269-4132-BFAB-451F66CE8289", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.14:netsec:*:*:*:*:*:*", "matchCriteriaId": "21612C17-7368-4108-B55B-5AB5CA6733E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "E9E1028E-2C07-4BA3-B891-FA853A87B280", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.15:netsec:*:*:*:*:*:*", "matchCriteriaId": "8A0D57D7-15AD-4CDF-A5A7-AB83F8E6154E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "9E74F577-70BD-4FAF-BCFD-10CD21FC5601", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.16:netsec:*:*:*:*:*:*", "matchCriteriaId": "06DB25C8-4EA5-465F-8EFA-BCA8D40F1795", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "57BB03E2-E61C-4A94-82DF-8720698CE271", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.17:netsec:*:*:*:*:*:*", "matchCriteriaId": "A149F8C2-3DA5-44B2-A288-3482F3975824", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "1B30A36F-5CE6-4246-8752-176FB5999C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.18:netsec:*:*:*:*:*:*", "matchCriteriaId": "9462B320-B69D-409D-8DCC-D8D6CA1A757D", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "E0F76DFD-4DAC-4B02-8967-B242CDEEF6C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.19:netsec:*:*:*:*:*:*", "matchCriteriaId": "ECCCBAE9-8FD4-43F0-9EF8-56E9BBA3D8C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "6A59BC20-3217-4584-9196-D1CD9E0D6B52", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.20:netsec:*:*:*:*:*:*", "matchCriteriaId": "BEA0014A-659B-4533-A393-6D4ADC80EB0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:*", "matchCriteriaId": "56F728BA-FC9E-4EEE-9A08-C9C7433BD8D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21:netsec:*:*:*:*:*:*", "matchCriteriaId": "8F1621F9-7C84-4CF0-BBCD-CEAEE8683BAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C64DF29-5B3D-401E-885E-8E37FD577254", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21.1:netsec:*:*:*:*:*:*", "matchCriteriaId": "346C9F65-B5FB-4A75-8E1B-137112F270D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A7BF52A-2FF8-40ED-B757-28A1101DE8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.22:netsec:*:*:*:*:*:*", "matchCriteriaId": "7EFEE380-0C64-4413-AF3A-45ABC8833500", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:*", "matchCriteriaId": "7A321C2D-852B-4498-ADD6-79956410AB94", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.23:netsec:*:*:*:*:*:*", "matchCriteriaId": "8CA18FC6-1480-400E-A885-8CDAE45AA7A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:*", "matchCriteriaId": "9D5F0DCF-C6A2-4A09-90C9-D70F174FDEF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.24:netsec:*:*:*:*:*:*", "matchCriteriaId": "93741261-378B-4C02-8D68-0E5F39128375", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:*", "matchCriteriaId": "C820538E-14EC-43C1-80DB-6AAE4905EF0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.25:netsec:*:*:*:*:*:*", "matchCriteriaId": "07CF9DD6-B624-49F0-A8E4-7EBCE7932BEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26:*:*:*:*:*:*:*", "matchCriteriaId": "E9562112-2505-4F78-86DE-F30EFAEE47D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26:netsec:*:*:*:*:*:*", "matchCriteriaId": "9EEA1E9C-C1FB-4EFD-86EA-DCF78C57FC35", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A6D8FD0-C8C1-4868-9AF1-96B1949C18AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.1:netsec:*:*:*:*:*:*", "matchCriteriaId": "5E20FAF7-9031-478E-A89C-D6FB3B5FDE3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:*", "matchCriteriaId": "72A840B4-216B-4063-997F-791FBC8C8658", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.2:netsec:*:*:*:*:*:*", "matchCriteriaId": "72375576-F857-4585-A677-A326D89A65B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.27:*:*:*:*:*:*:*", "matchCriteriaId": "BE47A547-26E7-48F9-B0A6-2F65E04A1EDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.28:*:*:*:*:*:*:*", "matchCriteriaId": "E1AEB744-FCF2-4A41-8866-9D1D20E6C6B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "967DF432-DEF4-4FA2-8C8D-19A7FB663A33", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "40850BF4-E252-4667-9B46-9B6FEF6E997D", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "1BB01DD1-B29B-4210-88CC-9ADB3148A410", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "5C0FA6A3-BFA9-4397-B75B-75C8357C36B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "295D4042-2D3C-481B-B969-2DDAC1161198", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "99E9EE2A-56AD-42BC-8CB0-D34091849B0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "96877A3E-B54B-4F31-B281-76CDC98B2D02", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "6D0B4503-42A6-4D88-954E-A662E91EC204", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "A4B73813-BCD8-429E-B9B9-D6665E026BC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "5BBA3ECC-4F40-41CD-A6D7-BBD680DDBACC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "9CBE2156-AF86-4C72-B33D-3FF83930F828", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "61408884-FBBF-4D94-A552-F99AB46DCED6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "4A527277-D97D-4B74-906F-7481BDBD96D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "D8B57A32-7B83-4783-A244-C26301970444", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "044FD0D0-FC92-4A01-B0D4-11A703EF21FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "3477EC1A-9634-492C-B052-35770A9C9F4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "1C90F104-FA2C-4091-B149-1774AC982C0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "C9328768-7C08-4143-B5F8-F5C2D735D21A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "6C04E2B3-094B-4828-A2FC-BB66244A9F73", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "4BDE3D31-4BB2-45A3-B085-8C91152A3152", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "CE0107D4-395E-45F1-B963-7618CCC007D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "53B8E11B-4984-45A8-A107-D276205988B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "2495DB98-F923-4E60-86EC-2DBB7A98C90C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "E186D125-996E-4900-A2B8-5CDC8B5D5136", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "27DC6CF7-4DF8-4472-A684-8CCB5E26FCFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "88576385-EF03-408B-9775-B52E6AFFE48A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "1A838577-2BA1-4792-8B69-6FB07FFD7727", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "CDEED3E1-13E0-46E6-8AAB-D24D2D04AE4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc1:*:*:*:*:*:*", "matchCriteriaId": "BFC1BB05-15C6-4829-86EB-5B1BFA4B5B17", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc2:*:*:*:*:*:*", "matchCriteriaId": "AB77E88B-7233-4979-914E-24E671C1FB23", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc3:*:*:*:*:*:*", "matchCriteriaId": "C4FF0F09-0268-480F-A2F3-6F8C3F323EEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc4:*:*:*:*:*:*", "matchCriteriaId": "1CCF9CAE-674A-4833-9D5C-FCBD865BE9F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:s800i:*:*:*:*:*:*:*:*", "matchCriteriaId": "15C01793-C5D3-4359-B332-A8A104832370", "versionEndIncluding": "1.1.0.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:s800i:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "0C3A0A08-4107-4B8B-AE7E-DC23849A54DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:s800i:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "9320928D-D83C-4258-AF62-AB2D1F50D972", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:s800i:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "569084D1-977D-41FC-A444-0B3F5199DDD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:s800i:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "02D182FB-761C-4F08-A776-B613FAC55230", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:s800i:1.0.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "C9046D49-6878-4571-8B9E-2FBD5BA80D19", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:s800i:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A7B5EDAB-61DD-4864-A159-39292D339DA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:s800i:1.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "101DFEFB-7627-4D36-AAA2-EDFB4D0E5AB5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The IAX2 channel driver (chan_iax2) in Asterisk 1.2 before revision 72630 and 1.4 before revision 65679, when configured to allow unauthenticated calls, sends \"early audio\" to an unverified source IP address of a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed NEW message." }, { "lang": "es", "value": "El IAX2 channel driver (chan_iax2) en Asterisk 1.2 anterior a la revisi\u00f3n 72630 y 1.4 anterior a la revisi\u00f3n 65679, cuando est\u00e1 configurado para permitir llamadas sin autenticaci\u00f3n, env\u00eda \"early audio\" a una IP sin verificar de un mensaje NEW, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (amplificaci\u00f3n del tr\u00e1fico) a trav\u00e9s de un mensaje NEW falseado." } ], "id": "CVE-2008-1923", "lastModified": "2024-11-21T00:45:40.483", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-04-23T16:05:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://bugs.digium.com/view.php?id=10078" }, { "source": "cve@mitre.org", "url": "http://downloads.digium.com/pub/security/AST-2008-006.html" }, { "source": "cve@mitre.org", "url": "http://www.altsci.com/concepts/page.php?s=asteri\u0026p=1" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42049" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.digium.com/view.php?id=10078" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://downloads.digium.com/pub/security/AST-2008-006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.altsci.com/concepts/page.php?s=asteri\u0026p=1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42049" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-16" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-07-18 17:30
Modified
2024-11-21 00:34
Severity ?
Summary
Stack-based buffer overflow in the IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to execute arbitrary code by sending a long (1) voice or (2) video RTP frame.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
asterisk | asterisk | 1.0 | |
asterisk | asterisk | 1.0.6 | |
asterisk | asterisk | 1.0.7 | |
asterisk | asterisk | 1.0.8 | |
asterisk | asterisk | 1.0.9 | |
asterisk | asterisk | 1.0.10 | |
asterisk | asterisk | 1.0.11 | |
asterisk | asterisk | 1.0.12 | |
asterisk | asterisk | 1.2.0_beta1 | |
asterisk | asterisk | 1.2.0_beta2 | |
asterisk | asterisk | 1.2.5 | |
asterisk | asterisk | 1.2.6 | |
asterisk | asterisk | 1.2.7 | |
asterisk | asterisk | 1.2.8 | |
asterisk | asterisk | 1.2.9 | |
asterisk | asterisk | 1.2.10 | |
asterisk | asterisk | 1.2.11 | |
asterisk | asterisk | 1.2.12 | |
asterisk | asterisk | 1.2.13 | |
asterisk | asterisk | 1.2.14 | |
asterisk | asterisk | 1.2.15 | |
asterisk | asterisk | 1.2.16 | |
asterisk | asterisk | 1.2.17 | |
asterisk | asterisk | 1.4.1 | |
asterisk | asterisk | 1.4.2 | |
asterisk | asterisk | 1.4.4_2007-04-27 | |
asterisk | asterisk | 1.4_beta | |
asterisk | asterisk | a | |
asterisk | asterisk | b.1.3.2 | |
asterisk | asterisk | b.1.3.3 | |
asterisk | asterisk | b.2.2.0 | |
asterisk | asterisk_appliance_developer_kit | * | |
asterisk | asterisknow | beta_5 | |
asterisk | asterisknow | beta_6 | |
asterisk | s800i_appliance | 1.0 | |
asterisk | s800i_appliance | 1.0.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "54F50B72-EFB3-448F-A2B8-C2BE4D4BF341", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "69BE50A7-FCA8-470A-B212-A516224306EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E306F943-ECA2-41C8-8C5D-F6A3D68ECE79", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3C309D90-24ED-4DC7-A770-783A7E28705F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "1B6DFD0D-86CE-4423-A0F4-C3581F916038", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "77255177-4EB2-47F5-8B3A-F6164C3C8173", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "2145ECD7-D734-4D58-8474-2F38DF9DB94F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "38C3AAB7-EA93-40BA-8ADE-380DA3520747", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta1:*:*:*:*:*:*:*", "matchCriteriaId": "E97310AF-E163-4C4F-A0BE-2940A67C336B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta2:*:*:*:*:*:*:*", "matchCriteriaId": "66A7A018-4EB6-4C15-9A22-E4299A6919C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "A7A7F90E-4600-4058-BB10-E39BE8F4968F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "5722AD0B-B329-4DA3-A251-A18DD6EE505E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "18B8E66C-B2EB-4F1F-9226-07A957885D8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "ECD3CBC1-1371-440A-9EA1-7495A4FA2C49", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "1B4841AD-96B7-4518-AC3E-3D23C88C083B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "C89A173C-C64A-440F-BCC6-EDE692521171", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "C716CAB8-5F2D-44DA-982B-3A47B3B59A1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "F0FABB45-93A9-49BB-93DA-D13305E2FF84", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "A5F82331-A7C1-4166-AE45-A83BD7FC3D25", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "26A10E99-3A8C-430A-8FB6-4A55E01A00E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "E5DF84B2-A104-4FA2-8B02-D243D76ACEE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "B4BA2270-DF93-48FB-A90F-DFBFED05F051", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "B4FE0264-95E4-4B75-8904-369035DEA2F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "593AA737-5AF3-4F7C-B74B-D3F37701C435", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "D942B911-979A-4AC3-93D6-07E420171E77", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.4_2007-04-27:*:*:*:*:*:*:*", "matchCriteriaId": "465DB1C7-D5DD-4A2D-8506-8642AB8363C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*", "matchCriteriaId": "181C8E98-2138-4BFC-B6B0-1DA270AEE7F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:a:*:business:*:*:*:*:*", "matchCriteriaId": "C6702046-43CF-4C84-9F76-24716C9F7D20", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.2:*:business:*:*:*:*:*", "matchCriteriaId": "524CF00B-1B36-4C1F-80B4-28349891669B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.3:*:business:*:*:*:*:*", "matchCriteriaId": "2942FA48-42CE-4E67-A5BF-7852652EDE28", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.2.0:*:business:*:*:*:*:*", "matchCriteriaId": "4160A834-9194-474C-819B-60627E470D13", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C150564-406F-4B49-AEF8-0F2887738E4D", "versionEndIncluding": "0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:*", "matchCriteriaId": "B12A09BE-1EE0-46D5-B3F0-E8847409A49A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:*", "matchCriteriaId": "7A5A734E-1DD3-4924-8AC1-97048FA3270F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9282AC42-E98A-4BC2-B46D-15B5776C961F", "vulnerable": true }, { "criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "83DBFD69-2500-46C1-827C-1493CF896F49", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to execute arbitrary code by sending a long (1) voice or (2) video RTP frame." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en el controlador de canal IAX2 (chan_iax2) de Asterisk anterior a 1.2.22 y 1.4.x anterior a 1.4.8, Business Edition anterior a B.2.2.1, AsteriskNOW anterior a beta7, Appliance Developer Kit anterior a 0.5.0, y s800i anterior a 1.0.2 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n enviando una trama RTP larga de (1) voz o (2) v\u00eddeo." } ], "id": "CVE-2007-3762", "lastModified": "2024-11-21T00:34:00.493", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-07-18T17:30:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-014.pdf" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/26099" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/29051" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2007/dsa-1358" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/24949" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018407" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35466" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-014.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26099" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29051" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2007/dsa-1358" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/24949" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018407" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35466" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-03-24 17:44
Modified
2024-11-21 00:44
Severity ?
Summary
The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "593AA737-5AF3-4F7C-B74B-D3F37701C435", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "D942B911-979A-4AC3-93D6-07E420171E77", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "84CB8C4A-F001-4DD7-8DFE-CB082B4BB969", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "96DB0240-E93D-4BDB-859B-B44C91996993", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "0F4BA849-E092-404A-92CD-44C2D99AE971", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "2C7014B4-1860-49AD-9469-9954C3CC01C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "3D1F0056-0945-476C-982E-7B41EB420A99", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "A53DEC9D-B288-42CD-9387-57315AC98D72", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "89C1F33F-27B6-4C56-92FF-EB2861ABBC22", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "64E07CF3-073D-4705-96A6-13367D4F5CAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "18D19CB0-E3D7-40DB-B0C0-B62BB6075267", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "77FB7CC1-BD0D-4F34-AB21-59CFD23C494C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "997FA3C7-1894-478A-ABF1-52DD2B0487E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "96E02BE0-BF4A-46C9-AFB5-47E8F18E3D17", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "292190EE-D9C8-4E3A-BB34-0ECD7B865482", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "7DAC55F9-1D43-4AA8-87C9-DB165442700B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "195B012E-0538-4140-9035-F5D1A442778B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "78AC03A7-41AB-45AF-AD89-291A7429B8A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*", "matchCriteriaId": "181C8E98-2138-4BFC-B6B0-1DA270AEE7F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4_revision_95946:*:*:*:*:*:*:*", "matchCriteriaId": "DB08F4FA-8600-4D21-A565-B3BF636634B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "FEAE6729-D79A-49B8-9758-BA74A60A238A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C05B437-C292-4AA0-8AFE-1CA07CD80034", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "0102C4C0-1A7D-4AB7-9817-44E6B0DB761E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "81DDF486-4185-48EE-869E-0AA6726C31F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "CF45A8E1-F6B1-42BD-9168-12062FA6EAEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "C5757B9B-2759-439A-9A6D-CCDD6C8C8940", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "FCD71268-EAA2-477B-8AC4-DE4853A262B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "529B2115-A191-4F3F-8F8C-A38B7C45463A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7E2D0508-C418-48CE-BF83-39F893688D1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta7:*:*:*:*:*:*:*", "matchCriteriaId": "5BC80EBD-14D3-44A6-A06F-0549722E0EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta8:*:*:*:*:*:*:*", "matchCriteriaId": "7859797F-E9AD-4429-BD2C-A24EC24A5D03", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CC6FE17C-3B08-4675-9F73-5DC0C2438BB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:*", "matchCriteriaId": "B12A09BE-1EE0-46D5-B3F0-E8847409A49A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:*", "matchCriteriaId": "7A5A734E-1DD3-4924-8AC1-97048FA3270F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:beta_7:*:*:*:*:*:*:*", "matchCriteriaId": "3AE2F09E-4B5A-4EDF-A48A-BCBBAA80156B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:s800i:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "0C3A0A08-4107-4B8B-AE7E-DC23849A54DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:s800i:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "9320928D-D83C-4258-AF62-AB2D1F50D972", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:s800i:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "569084D1-977D-41FC-A444-0B3F5199DDD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:s800i:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "02D182FB-761C-4F08-A776-B613FAC55230", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:s800i:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A7B5EDAB-61DD-4864-A159-39292D339DA2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses." }, { "lang": "es", "value": "El servidor AsteriskGUI HTTP en Asterisk Open Source 1.4.x antes de 1.4.19-rc3 y 1.6.x antes de 1.6.0-beta6, Business Edition C.x.x antes de C.1.6, AsteriskNOW antes de 1.0.2, Appliance Developer Kit antes de la revisi\u00f3n 104704 y s800i 1.0.x antes de 1.1.0.2 genera valores ID de gesti\u00f3n no lo suficientemente aleatorios, lo que facilita a atacantes remotos secuestrar una sesi\u00f3n de gesti\u00f3n a trav\u00e9s de una serie de adivinaciones de ID." } ], "id": "CVE-2008-1390", "lastModified": "2024-11-21T00:44:25.977", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-03-24T17:44:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://downloads.digium.com/pub/security/AST-2008-005.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29449" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/29470" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3764" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/489819/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/28316" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019679" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41304" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://downloads.digium.com/pub/security/AST-2008-005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29449" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29470" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3764" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/489819/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/28316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019679" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41304" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-255" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-03-20 00:44
Modified
2024-11-21 00:44
Severity ?
Summary
Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:asterisk:asterisk:a:*:business:*:*:*:*:*", "matchCriteriaId": "C6702046-43CF-4C84-9F76-24716C9F7D20", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.2:*:business:*:*:*:*:*", "matchCriteriaId": "524CF00B-1B36-4C1F-80B4-28349891669B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.3:*:business:*:*:*:*:*", "matchCriteriaId": "2942FA48-42CE-4E67-A5BF-7852652EDE28", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.2.0:*:business:*:*:*:*:*", "matchCriteriaId": "4160A834-9194-474C-819B-60627E470D13", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.2.1:*:business:*:*:*:*:*", "matchCriteriaId": "D81F6E55-80F1-4770-9FF0-305EEEF3C4E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.1:*:business:*:*:*:*:*", "matchCriteriaId": "087DC9EC-0DF2-48AE-BB62-8DDF95C3EC56", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.2:*:business:*:*:*:*:*", "matchCriteriaId": "471032A5-5EB6-44D1-91C8-BEA42C1E205A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.3:*:business:*:*:*:*:*", "matchCriteriaId": "6FEB3FCA-065E-4C32-A4C7-F2C79F214F17", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.4:*:business:*:*:*:*:*", "matchCriteriaId": "636D765F-C47B-4762-9419-D7B51FA38AEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.5:*:business:*:*:*:*:*", "matchCriteriaId": "36F29EE8-E05F-4F0A-B0FA-66C551856C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.6:*:business:*:*:*:*:*", "matchCriteriaId": "CEAA72FE-E13C-4363-AF5C-7D1CEEE2FA77", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:c.1.0_beta7:*:business:*:*:*:*:*", "matchCriteriaId": "D0A87D63-35F5-47D7-893B-E8B179B16C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:c.1.0_beta8:*:business:*:*:*:*:*", "matchCriteriaId": "95C1809E-9031-483F-B873-160284FA71D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:c.1.6:*:business:*:*:*:*:*", "matchCriteriaId": "E35C336A-A786-476B-8B9F-E682D999B6AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:c.1.6.1:*:business:*:*:*:*:*", "matchCriteriaId": "8121721B-EBC6-44EA-86D6-7B0FF1C8FF52", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*", "matchCriteriaId": "DEF22BFB-2B22-4FBE-AE35-D7BC2A461865", "versionEndIncluding": "1.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C05B437-C292-4AA0-8AFE-1CA07CD80034", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "0102C4C0-1A7D-4AB7-9817-44E6B0DB761E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "81DDF486-4185-48EE-869E-0AA6726C31F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "CF45A8E1-F6B1-42BD-9168-12062FA6EAEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "C5757B9B-2759-439A-9A6D-CCDD6C8C8940", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E4548D39-0562-4946-AA51-A7C1A31AEE8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "FCD71268-EAA2-477B-8AC4-DE4853A262B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "529B2115-A191-4F3F-8F8C-A38B7C45463A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "B76EFDCA-20EC-4C62-A0AD-CBD317D69441", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4EC98BF-00C0-48F5-ADFA-DB8AC6E95F3A", "versionEndIncluding": "a", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E140B81-4528-4BCC-AE60-B91DD4B2C9FE", "versionEndIncluding": "b.2.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E8CF6B9-050B-426B-86FC-8A32E8C09A68", "versionEndIncluding": "c.1.6.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7C58E6B-AECC-48AF-8059-61772690776A", "versionEndIncluding": "1.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CC6FE17C-3B08-4675-9F73-5DC0C2438BB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*", "matchCriteriaId": "A66DC4A6-290C-48ED-A0F8-8DC05EA0AAC6", "versionEndIncluding": "1.2.26", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*", "matchCriteriaId": "6CEDD6A3-13B1-4553-8BAD-93DB5203F3B6", "versionEndIncluding": "1.4.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:*:rc-2:*:*:*:*:*:*", "matchCriteriaId": "F4AB8D8F-15AC-4516-85A2-B5D2B5B3DF04", "versionEndIncluding": "1.4.19", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "678DB154-4363-42FF-8B28-367923FC6595", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "E8F2C378-FF0E-4765-9F66-625C4064D5CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "A55A9295-F632-4856-90A1-38371EB98589", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7FAE6AF1-884D-41F7-B174-9E13C7719C99", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DCA9E35B-9A6B-42F2-9315-9C7D09F62227", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "89B1F293-4F0F-48FD-A1F1-1230B94D87D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DDF7EC20-A424-45E5-B7E4-3CC86075858C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "C790E105-55C8-4CDC-9FA8-E1FF6F130A67", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "44C860EF-2B29-4995-B942-000CC43FDD14", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "1ADB80EF-C724-44BA-88FC-24087799D0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "78B39BE8-7E2D-42DF-8633-44CAD5662777", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "F39036E3-0027-4C72-9DEB-9A6E2B4512C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "A037E6F9-3EF7-4EEB-AC16-081421BCE40D", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "6A7EC02A-9C9E-4589-BBB3-1908D3078A7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "6C70FA9C-6F3B-4BDF-97FB-81D06AB0EE65", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9F7971E1-F136-4ADC-95EC-BC4F92E838CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "E62D108C-862D-4BDB-BE37-285AA4C9C59A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "CF1422F3-829D-498C-83A6-02989DFB70A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CBEB9D69-A404-4053-92F9-CAC3481AFF1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0beta2:*:*:*:*:*:*:*", "matchCriteriaId": "C7B2F43B-8B69-4BF6-86B7-A225175FF068", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "27202966-2C41-4964-9497-1887D2A834C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1471B5A2-15BE-4E7C-BA49-2E6002F7C8EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "7108D72F-5AFD-4EEF-B2A9-CA4FA792E193", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "107DA2D8-FE7C-4B70-856D-43D58B988694", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "ABD71DD9-8A15-45E2-9FB3-F0544D7E1B80", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "5C14614F-4E27-40A6-9E56-2B1DBB10330B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "7A2F2F5A-66FD-4057-917C-66332A88D83E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "399B0206-B48B-46EF-8CA6-A6E5A2550B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "26E9760F-C0EB-47BB-8DA4-CC7815099DAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "4C510A9A-C3E2-4AF8-9919-1A22E918CDEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "6BD915CD-A7D3-4305-A6C0-290C648A226C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "9E79CCE5-C29B-4726-8D2F-BC20F70959BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "F29C13DB-6F04-4B41-90A2-2408D70F3641", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "0F4F734E-0E78-4957-B323-8E9FBA7FF15C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A4B117B-E945-4033-A79D-10DFAA3DF18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EA6D866F-8189-4FFD-AA24-47C0A015C246", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "A4EBFB79-C269-4132-BFAB-451F66CE8289", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "E9E1028E-2C07-4BA3-B891-FA853A87B280", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "9E74F577-70BD-4FAF-BCFD-10CD21FC5601", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "57BB03E2-E61C-4A94-82DF-8720698CE271", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "1B30A36F-5CE6-4246-8752-176FB5999C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "E0F76DFD-4DAC-4B02-8967-B242CDEEF6C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "6A59BC20-3217-4584-9196-D1CD9E0D6B52", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:*", "matchCriteriaId": "56F728BA-FC9E-4EEE-9A08-C9C7433BD8D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C64DF29-5B3D-401E-885E-8E37FD577254", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A7BF52A-2FF8-40ED-B757-28A1101DE8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:*", "matchCriteriaId": "7A321C2D-852B-4498-ADD6-79956410AB94", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:*", "matchCriteriaId": "9D5F0DCF-C6A2-4A09-90C9-D70F174FDEF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:*", "matchCriteriaId": "C820538E-14EC-43C1-80DB-6AAE4905EF0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A6D8FD0-C8C1-4868-9AF1-96B1949C18AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:*", "matchCriteriaId": "72A840B4-216B-4063-997F-791FBC8C8658", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "967DF432-DEF4-4FA2-8C8D-19A7FB663A33", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "40850BF4-E252-4667-9B46-9B6FEF6E997D", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "1BB01DD1-B29B-4210-88CC-9ADB3148A410", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "5C0FA6A3-BFA9-4397-B75B-75C8357C36B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "295D4042-2D3C-481B-B969-2DDAC1161198", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "044FD0D0-FC92-4A01-B0D4-11A703EF21FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "3477EC1A-9634-492C-B052-35770A9C9F4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "1C90F104-FA2C-4091-B149-1774AC982C0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "C9328768-7C08-4143-B5F8-F5C2D735D21A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "6C04E2B3-094B-4828-A2FC-BB66244A9F73", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "4BDE3D31-4BB2-45A3-B085-8C91152A3152", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "CE0107D4-395E-45F1-B963-7618CCC007D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "53B8E11B-4984-45A8-A107-D276205988B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "2495DB98-F923-4E60-86EC-2DBB7A98C90C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "E186D125-996E-4900-A2B8-5CDC8B5D5136", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "27DC6CF7-4DF8-4472-A684-8CCB5E26FCFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "1A838577-2BA1-4792-8B69-6FB07FFD7727", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc3:*:*:*:*:*:*", "matchCriteriaId": "C4FF0F09-0268-480F-A2F3-6F8C3F323EEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:s800i:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D1E04DC-AE6A-4536-8E45-36494E51B036", "versionEndIncluding": "1.1.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:s800i:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "0C3A0A08-4107-4B8B-AE7E-DC23849A54DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:s800i:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "9320928D-D83C-4258-AF62-AB2D1F50D972", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:s800i:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "569084D1-977D-41FC-A444-0B3F5199DDD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:s800i:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "02D182FB-761C-4F08-A776-B613FAC55230", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:s800i:1.0.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "C9046D49-6878-4571-8B9E-2FBD5BA80D19", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:s800i:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A7B5EDAB-61DD-4864-A159-39292D339DA2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header." }, { "lang": "es", "value": "Vulnerabilidad no especificada en Asterisk Open Source versiones 1.2.x anteriores a 1.2.27, 1.4.x anteriores a 1.4.18.1 y 1.4.19-rc3; en Business Edition versiones A.x.x, B.x.x anteriores a B.2.5.1, y C.x.x anteriores a C.1.6.2; en AsteriskNOW versiones 1.0.x anteriores a 1.0.2; Appliance Developer Kit anteriores a 1.4 revisi\u00f3n 109393; y s800i versiones 1.0.x anteriores a 1.1.0.2 permite a atacantes remotos acceder al controlador del canal SIP mediante la utilizaci\u00f3n de una cabecera From especialmente construida." } ], "id": "CVE-2008-1332", "lastModified": "2024-11-21T00:44:17.453", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 8.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 9.2, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-03-20T00:44:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://downloads.digium.com/pub/security/AST-2008-003.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29426" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29456" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29470" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29782" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29957" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200804-13.xml" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1019629" }, { "source": "cve@mitre.org", "url": "http://www.asterisk.org/node/48466" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2008/dsa-1525" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/489818/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/28310" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/0928" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41308" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://downloads.digium.com/pub/security/AST-2008-003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29426" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29456" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29470" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29782" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29957" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200804-13.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1019629" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.asterisk.org/node/48466" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2008/dsa-1525" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/489818/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/28310" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0928" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41308" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-04-23 16:05
Modified
2024-11-21 00:45
Severity ?
Summary
The IAX2 channel driver (chan_iax2) in Asterisk Open Source 1.0.x, 1.2.x before 1.2.28, and 1.4.x before 1.4.19.1; Business Edition A.x.x, B.x.x before B.2.5.2, and C.x.x before C.1.8.1; AsteriskNOW before 1.0.3; Appliance Developer Kit 0.x.x; and s800i before 1.1.0.3, when configured to allow unauthenticated calls, does not verify that an ACK response contains a call number matching the server's reply to a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed ACK response that does not complete a 3-way handshake. NOTE: this issue exists because of an incomplete fix for CVE-2008-1923.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C05B437-C292-4AA0-8AFE-1CA07CD80034", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "0102C4C0-1A7D-4AB7-9817-44E6B0DB761E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "81DDF486-4185-48EE-869E-0AA6726C31F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "CF45A8E1-F6B1-42BD-9168-12062FA6EAEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "C5757B9B-2759-439A-9A6D-CCDD6C8C8940", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E4548D39-0562-4946-AA51-A7C1A31AEE8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "FCD71268-EAA2-477B-8AC4-DE4853A262B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "529B2115-A191-4F3F-8F8C-A38B7C45463A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*", "matchCriteriaId": "3097291D-BBBB-4C69-8909-D6F7AC622B5D", "versionEndIncluding": "b.2.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*", "matchCriteriaId": "267F32ED-B9E4-4454-99C1-F445E52EE96F", "versionEndIncluding": "c1.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:a:*:*:*:*:*:*:*", "matchCriteriaId": "313B3A38-8DEA-4D62-A1A4-0B6011E81870", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "802F8680-AB38-41AF-BFC8-F6927F6B1626", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "BCAE8D90-B032-4C60-B487-BE655D00FFAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "AB64A872-B7B8-46A8-81E4-49EDAC160531", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "21000270-C9B9-430C-A252-763887A15835", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "12F7CF45-5482-4947-8F1D-48C746987475", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "7B64995D-7892-49AB-A89D-A5D15615C5D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "0397DBD4-EA00-444A-9008-4932F99DF325", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "6FCD865F-BC39-4255-A797-6E5945773337", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "D7203093-7209-4184-92CB-08AD73FAC379", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E4956871-4DD3-4299-8BEB-9D98A4449A42", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "F981A428-E7F3-4DE5-91DC-60A1C5C6C6EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0:beta8:*:*:*:*:*:*", "matchCriteriaId": "AF94C93A-723D-4DC5-9342-F091C8C6FF7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "E5C988FD-CFB9-4763-BE5A-B89FB3538FD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "00A6DAD0-D4C3-4A58-A35A-991E04B50EC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "6413B123-65DE-4483-A8A0-F5F30A809570", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:*:*:*:*:*:*:*:*", "matchCriteriaId": "272DE03B-1470-45FF-A31B-2CE44A8E8378", "versionEndIncluding": "1.0.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CC6FE17C-3B08-4675-9F73-5DC0C2438BB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0D8AB81C-3DCF-42E9-8022-2F7135022C73", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB10847E-585B-492B-A174-4D1C14755E0E", "versionEndIncluding": "1.2.27", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BD2F115-4614-4E25-8902-356EEC966E8E", "versionEndIncluding": "1.4.19", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "678DB154-4363-42FF-8B28-367923FC6595", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0B41BC83-3AE3-4C89-A682-E24A4EFF9605", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "98F2FE25-8CDA-4D6D-884B-82C4D90F7FED", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "E8F2C378-FF0E-4765-9F66-625C4064D5CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "A55A9295-F632-4856-90A1-38371EB98589", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7FAE6AF1-884D-41F7-B174-9E13C7719C99", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DCA9E35B-9A6B-42F2-9315-9C7D09F62227", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "89B1F293-4F0F-48FD-A1F1-1230B94D87D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DDF7EC20-A424-45E5-B7E4-3CC86075858C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "C790E105-55C8-4CDC-9FA8-E1FF6F130A67", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "44C860EF-2B29-4995-B942-000CC43FDD14", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "1ADB80EF-C724-44BA-88FC-24087799D0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "78B39BE8-7E2D-42DF-8633-44CAD5662777", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "F39036E3-0027-4C72-9DEB-9A6E2B4512C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "A037E6F9-3EF7-4EEB-AC16-081421BCE40D", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.11:patch:*:*:*:*:*:*", "matchCriteriaId": "A553D442-A573-4A60-8514-3C70F651756D", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "6A7EC02A-9C9E-4589-BBB3-1908D3078A7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.11.1:patch:*:*:*:*:*:*", "matchCriteriaId": "2395C742-D9FE-466F-BC97-67A846539121", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "6C70FA9C-6F3B-4BDF-97FB-81D06AB0EE65", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.12:patch:*:*:*:*:*:*", "matchCriteriaId": "58487C69-86C0-4736-BC90-4292AF8E3DB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9F7971E1-F136-4ADC-95EC-BC4F92E838CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "E62D108C-862D-4BDB-BE37-285AA4C9C59A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "CF1422F3-829D-498C-83A6-02989DFB70A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CBEB9D69-A404-4053-92F9-CAC3481AFF1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E816CCDB-4169-4F09-AE87-E467F4BE7685", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "27202966-2C41-4964-9497-1887D2A834C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1471B5A2-15BE-4E7C-BA49-2E6002F7C8EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.2:netsec:*:*:*:*:*:*", "matchCriteriaId": "65223182-1675-462C-AF67-4A48760A63F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "7108D72F-5AFD-4EEF-B2A9-CA4FA792E193", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.3:netsec:*:*:*:*:*:*", "matchCriteriaId": "DC7EB4CD-6436-4E0B-A620-9DF2AC8A3C66", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "107DA2D8-FE7C-4B70-856D-43D58B988694", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.4:netsec:*:*:*:*:*:*", "matchCriteriaId": "02D5E6DF-7C9C-479F-986B-D5C8A144ACB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "ABD71DD9-8A15-45E2-9FB3-F0544D7E1B80", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.5:netsec:*:*:*:*:*:*", "matchCriteriaId": "68AF6200-1385-449F-A00E-2BACEE16450B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "5C14614F-4E27-40A6-9E56-2B1DBB10330B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.6:netsec:*:*:*:*:*:*", "matchCriteriaId": "61C0769F-6739-41D2-ADD8-924AC04C5F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "7A2F2F5A-66FD-4057-917C-66332A88D83E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7:netsec:*:*:*:*:*:*", "matchCriteriaId": "8EF13987-5767-4FED-9584-63D74B0A30A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "399B0206-B48B-46EF-8CA6-A6E5A2550B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7.1:netsec:*:*:*:*:*:*", "matchCriteriaId": "C57C1324-E11A-4B2B-9722-A4A63AEF0497", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "26E9760F-C0EB-47BB-8DA4-CC7815099DAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.8:netsec:*:*:*:*:*:*", "matchCriteriaId": "EE6D9718-D57D-48F6-A2B1-CECAFFCDDFB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "4C510A9A-C3E2-4AF8-9919-1A22E918CDEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "6BD915CD-A7D3-4305-A6C0-290C648A226C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.9.1:netsec:*:*:*:*:*:*", "matchCriteriaId": "3249AB40-2058-42E9-9A33-64E434E5BB64", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "9E79CCE5-C29B-4726-8D2F-BC20F70959BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.10:netsec:*:*:*:*:*:*", "matchCriteriaId": "0CF6584D-A7BB-4BD5-8232-9293FEE4A971", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "F29C13DB-6F04-4B41-90A2-2408D70F3641", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.11:netsec:*:*:*:*:*:*", "matchCriteriaId": "174D6B56-7D0F-46F0-849A-FD05CB348FAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "0F4F734E-0E78-4957-B323-8E9FBA7FF15C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.12:netsec:*:*:*:*:*:*", "matchCriteriaId": "938F545A-F8A7-455E-8E5A-2B5454B6CE53", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A4B117B-E945-4033-A79D-10DFAA3DF18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.12.1:netsec:*:*:*:*:*:*", "matchCriteriaId": "E7C0897A-C841-4AAB-A6B3-1FCF7A99A60A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EA6D866F-8189-4FFD-AA24-47C0A015C246", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.13:netsec:*:*:*:*:*:*", "matchCriteriaId": "B2BAA1B3-7DD3-4248-915D-2BCC0ACFA2C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "A4EBFB79-C269-4132-BFAB-451F66CE8289", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.14:netsec:*:*:*:*:*:*", "matchCriteriaId": "21612C17-7368-4108-B55B-5AB5CA6733E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "E9E1028E-2C07-4BA3-B891-FA853A87B280", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.15:netsec:*:*:*:*:*:*", "matchCriteriaId": "8A0D57D7-15AD-4CDF-A5A7-AB83F8E6154E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "9E74F577-70BD-4FAF-BCFD-10CD21FC5601", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.16:netsec:*:*:*:*:*:*", "matchCriteriaId": "06DB25C8-4EA5-465F-8EFA-BCA8D40F1795", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "57BB03E2-E61C-4A94-82DF-8720698CE271", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.17:netsec:*:*:*:*:*:*", "matchCriteriaId": "A149F8C2-3DA5-44B2-A288-3482F3975824", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "1B30A36F-5CE6-4246-8752-176FB5999C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.18:netsec:*:*:*:*:*:*", "matchCriteriaId": "9462B320-B69D-409D-8DCC-D8D6CA1A757D", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "E0F76DFD-4DAC-4B02-8967-B242CDEEF6C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.19:netsec:*:*:*:*:*:*", "matchCriteriaId": "ECCCBAE9-8FD4-43F0-9EF8-56E9BBA3D8C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "6A59BC20-3217-4584-9196-D1CD9E0D6B52", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.20:netsec:*:*:*:*:*:*", "matchCriteriaId": "BEA0014A-659B-4533-A393-6D4ADC80EB0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:*", "matchCriteriaId": "56F728BA-FC9E-4EEE-9A08-C9C7433BD8D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21:netsec:*:*:*:*:*:*", "matchCriteriaId": "8F1621F9-7C84-4CF0-BBCD-CEAEE8683BAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C64DF29-5B3D-401E-885E-8E37FD577254", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21.1:netsec:*:*:*:*:*:*", "matchCriteriaId": "346C9F65-B5FB-4A75-8E1B-137112F270D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A7BF52A-2FF8-40ED-B757-28A1101DE8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.22:netsec:*:*:*:*:*:*", "matchCriteriaId": "7EFEE380-0C64-4413-AF3A-45ABC8833500", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:*", "matchCriteriaId": "7A321C2D-852B-4498-ADD6-79956410AB94", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.23:netsec:*:*:*:*:*:*", "matchCriteriaId": "8CA18FC6-1480-400E-A885-8CDAE45AA7A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:*", "matchCriteriaId": "9D5F0DCF-C6A2-4A09-90C9-D70F174FDEF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.24:netsec:*:*:*:*:*:*", "matchCriteriaId": "93741261-378B-4C02-8D68-0E5F39128375", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:*", "matchCriteriaId": "C820538E-14EC-43C1-80DB-6AAE4905EF0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.25:netsec:*:*:*:*:*:*", "matchCriteriaId": "07CF9DD6-B624-49F0-A8E4-7EBCE7932BEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26:*:*:*:*:*:*:*", "matchCriteriaId": "E9562112-2505-4F78-86DE-F30EFAEE47D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26:netsec:*:*:*:*:*:*", "matchCriteriaId": "9EEA1E9C-C1FB-4EFD-86EA-DCF78C57FC35", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A6D8FD0-C8C1-4868-9AF1-96B1949C18AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.1:netsec:*:*:*:*:*:*", "matchCriteriaId": "5E20FAF7-9031-478E-A89C-D6FB3B5FDE3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:*", "matchCriteriaId": "72A840B4-216B-4063-997F-791FBC8C8658", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.2:netsec:*:*:*:*:*:*", "matchCriteriaId": "72375576-F857-4585-A677-A326D89A65B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "967DF432-DEF4-4FA2-8C8D-19A7FB663A33", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "40850BF4-E252-4667-9B46-9B6FEF6E997D", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "1BB01DD1-B29B-4210-88CC-9ADB3148A410", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "5C0FA6A3-BFA9-4397-B75B-75C8357C36B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "295D4042-2D3C-481B-B969-2DDAC1161198", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "044FD0D0-FC92-4A01-B0D4-11A703EF21FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "3477EC1A-9634-492C-B052-35770A9C9F4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "1C90F104-FA2C-4091-B149-1774AC982C0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "C9328768-7C08-4143-B5F8-F5C2D735D21A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "6C04E2B3-094B-4828-A2FC-BB66244A9F73", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "4BDE3D31-4BB2-45A3-B085-8C91152A3152", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "CE0107D4-395E-45F1-B963-7618CCC007D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "53B8E11B-4984-45A8-A107-D276205988B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "2495DB98-F923-4E60-86EC-2DBB7A98C90C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "E186D125-996E-4900-A2B8-5CDC8B5D5136", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "27DC6CF7-4DF8-4472-A684-8CCB5E26FCFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "88576385-EF03-408B-9775-B52E6AFFE48A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "1A838577-2BA1-4792-8B69-6FB07FFD7727", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "CDEED3E1-13E0-46E6-8AAB-D24D2D04AE4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:s800i:*:*:*:*:*:*:*:*", "matchCriteriaId": "15C01793-C5D3-4359-B332-A8A104832370", "versionEndIncluding": "1.1.0.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:s800i:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "0C3A0A08-4107-4B8B-AE7E-DC23849A54DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:s800i:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "9320928D-D83C-4258-AF62-AB2D1F50D972", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:s800i:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "569084D1-977D-41FC-A444-0B3F5199DDD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:s800i:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "02D182FB-761C-4F08-A776-B613FAC55230", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:s800i:1.0.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "C9046D49-6878-4571-8B9E-2FBD5BA80D19", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:s800i:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A7B5EDAB-61DD-4864-A159-39292D339DA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:s800i:1.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "101DFEFB-7627-4D36-AAA2-EDFB4D0E5AB5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The IAX2 channel driver (chan_iax2) in Asterisk Open Source 1.0.x, 1.2.x before 1.2.28, and 1.4.x before 1.4.19.1; Business Edition A.x.x, B.x.x before B.2.5.2, and C.x.x before C.1.8.1; AsteriskNOW before 1.0.3; Appliance Developer Kit 0.x.x; and s800i before 1.1.0.3, when configured to allow unauthenticated calls, does not verify that an ACK response contains a call number matching the server\u0027s reply to a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed ACK response that does not complete a 3-way handshake. NOTE: this issue exists because of an incomplete fix for CVE-2008-1923." }, { "lang": "es", "value": "El driver del canal IAX2 (chan_iax2) en Asterisk Open Source 1.0.x, 1.2.x anteriores a 1.2.28 y 1.4.x anteriores a 1.4.19.1; Business Edition A.x.x, B.x.x anteriores a B.2.5.2 y C.x.x anteriores a C.1.8.1; AsteriskNOW anteriores a 1.0.3; Apliance Developer Kit 0.x.x y s800i anterior a la 1.1.0.3, cuando est\u00e1 configurado para permitir llamadas no autenticadas, no verifica que una respuesta ACK contenga un n\u00famero que coincida con el de respuesta del servidor a un NUEVO mensaje, que puede permitir a los atacantes provocar una denegaci\u00f3n de servicio (amplificaci\u00f3n del tr\u00e1fico) a trav\u00e9s de una respuesta ACK falseada, que no complete la negociaci\u00f3n de 3 pasos. NOTA: Este problema existe debido a una correci\u00f3n incompleto para CVE-2008-1923" } ], "id": "CVE-2008-1897", "lastModified": "2024-11-21T00:45:36.733", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-04-23T16:05:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://bugs.digium.com/view.php?id=10078" }, { "source": "cve@mitre.org", "url": "http://downloads.digium.com/pub/security/AST-2008-006.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29927" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30010" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30042" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/34982" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200905-01.xml" }, { "source": "cve@mitre.org", "url": "http://www.altsci.com/concepts/page.php?s=asteri\u0026p=2" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2008/dsa-1563" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/491220/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/28901" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019918" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/1324" }, { "source": "cve@mitre.org", "url": "https://downloads.asterisk.org/pub/security/AST-2008-006.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41966" }, { "source": "cve@mitre.org", "url": "https://github.com/jcollie/asterisk/commit/60de4fbbdf3ede49f158e23a9e3b679f2e519c1e" }, { "source": "cve@mitre.org", "url": "https://github.com/jcollie/asterisk/commit/771b3d8749b34b6eea4e03a2e514380da9582f90" }, { "source": "cve@mitre.org", "url": "https://github.com/jcollie/asterisk/commit/a8b180875b037b8da26f6a3bcc8e5e98b8c904d2" }, { "source": "cve@mitre.org", "url": "https://github.com/kaoru6/asterisk/commit/1fe14f38dd43dc894d21f85762b51208ba5c8acb" }, { "source": "cve@mitre.org", "url": "https://github.com/lyx2014/Asterisk/commit/0670e43c30135044e25cca7f80e1833e2c128653" }, { "source": "cve@mitre.org", "url": "https://github.com/mojolingo/asterisk/commit/20ac3662f137dbf7f42d5295590069a7d3b1166b" }, { "source": "cve@mitre.org", "url": "https://github.com/pruiz/asterisk/commit/e0ef9bd22810c6969a7f222eec04798f19a7e2d6" }, { "source": "cve@mitre.org", "url": "https://github.com/silentindark/asterisk-1/commit/fe8b7f31db687f8b9992864b82c93d22833019c7" }, { "source": "cve@mitre.org", "url": "https://github.com/xrg/asterisk-xrg/commit/10da3dab24e8ca08cf2c983f8d0206e383535b5a" }, { "source": "cve@mitre.org", "url": "https://github.com/xrg/asterisk-xrg/commit/51714a24347dc57f9a208a4a8af84115ef407b83" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00581.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00600.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.digium.com/view.php?id=10078" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://downloads.digium.com/pub/security/AST-2008-006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29927" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30010" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30042" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34982" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200905-01.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.altsci.com/concepts/page.php?s=asteri\u0026p=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2008/dsa-1563" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/491220/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/28901" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019918" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1324" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://downloads.asterisk.org/pub/security/AST-2008-006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41966" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/jcollie/asterisk/commit/60de4fbbdf3ede49f158e23a9e3b679f2e519c1e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/jcollie/asterisk/commit/771b3d8749b34b6eea4e03a2e514380da9582f90" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/jcollie/asterisk/commit/a8b180875b037b8da26f6a3bcc8e5e98b8c904d2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/kaoru6/asterisk/commit/1fe14f38dd43dc894d21f85762b51208ba5c8acb" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/lyx2014/Asterisk/commit/0670e43c30135044e25cca7f80e1833e2c128653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/mojolingo/asterisk/commit/20ac3662f137dbf7f42d5295590069a7d3b1166b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/pruiz/asterisk/commit/e0ef9bd22810c6969a7f222eec04798f19a7e2d6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/silentindark/asterisk-1/commit/fe8b7f31db687f8b9992864b82c93d22833019c7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/xrg/asterisk-xrg/commit/10da3dab24e8ca08cf2c983f8d0206e383535b5a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/xrg/asterisk-xrg/commit/51714a24347dc57f9a208a4a8af84115ef407b83" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00581.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00600.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-01-08 02:46
Modified
2024-11-21 00:41
Severity ?
Summary
The SIP channel driver in Asterisk Open Source 1.4.x before 1.4.17, Business Edition before C.1.0-beta8, AsteriskNOW before beta7, Appliance Developer Kit before Asterisk 1.4 revision 95946, and Appliance s800i 1.0.x before 1.0.3.4 allows remote attackers to cause a denial of service (daemon crash) via a BYE message with an Also (Also transfer) header, which triggers a NULL pointer dereference.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
asterisk | asterisk_appliance_developer_kit | * | |
asterisk | asterisk_business_edition | * | |
asterisk | asterisknow | * | |
asterisk | open_source | * | |
asterisk | s800i | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D6AD937-90F0-4359-85DD-038604F64D2D", "versionEndIncluding": "1.4_revision_95945", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*", "matchCriteriaId": "526991C1-D07E-465C-A609-704C19F8096A", "versionEndIncluding": "c.1.0beta7", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:*:*:*:*:*:*:*:*", "matchCriteriaId": "C896A32E-906D-4AD0-A00B-11DC064CBA6E", "versionEndIncluding": "beta_6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2EF54E7-C4A1-474F-9D89-18E13F620F42", "versionEndIncluding": "1.4.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:s800i:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFA6388A-09B4-4338-8228-3E27500DD521", "versionEndIncluding": "1.0.3.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SIP channel driver in Asterisk Open Source 1.4.x before 1.4.17, Business Edition before C.1.0-beta8, AsteriskNOW before beta7, Appliance Developer Kit before Asterisk 1.4 revision 95946, and Appliance s800i 1.0.x before 1.0.3.4 allows remote attackers to cause a denial of service (daemon crash) via a BYE message with an Also (Also transfer) header, which triggers a NULL pointer dereference." }, { "lang": "es", "value": "El controlador de canal SIP de Asterisk Open Source 1.4.x versiones anteriores a 1.4.17, Business Edition versiones anteriores a C.1.0-beta8, AsteriskNOW versiones anteriores a beta7, Appliance Developer Kit versiones anteriores a Asterisk 1.4 revision 95946, y Appliance s800i 1.0.x versiones anteriores a 1.0.3.4 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (c\u00e1ida de demonio) mediante un mensaje BYE con una cabecera Also (tranfiere tambi\u00e9n), que dispara un referencia a puntero NULL." } ], "id": "CVE-2008-0095", "lastModified": "2024-11-21T00:41:09.580", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-01-08T02:46:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://bugs.digium.com/view.php?id=11637" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://downloads.digium.com/pub/security/AST-2008-001.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/28299" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/28312" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3520" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/485727/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/27110" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019152" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/0019" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39361" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00166.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00167.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://bugs.digium.com/view.php?id=11637" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://downloads.digium.com/pub/security/AST-2008-001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28299" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/28312" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3520" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/485727/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/27110" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019152" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0019" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00166.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00167.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-03-24 17:44
Modified
2024-11-21 00:44
Severity ?
Summary
Multiple buffer overflows in Asterisk Open Source 1.4.x before 1.4.18.1 and 1.4.19-rc3, Open Source 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6.1, AsteriskNOW 1.0.x before 1.0.2, Appliance Developer Kit before 1.4 revision 109386, and s800i 1.1.x before 1.1.0.2 allow remote attackers to (1) write a zero to an arbitrary memory location via a large RTP payload number, related to the ast_rtp_unset_m_type function in main/rtp.c; or (2) write certain integers to an arbitrary memory location via a large number of RTP payloads, related to the process_sdp function in channels/chan_sip.c.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
asterisk | asterisk_appliance_developer_kit | 1.4 | |
asterisk | asterisk_business_edition | * | |
asterisk | asterisk_business_edition | * | |
asterisk | asterisknow | * | |
asterisk | open_source | * | |
asterisk | open_source | * | |
asterisk | open_source | * | |
asterisk | s800i | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7E2D0508-C418-48CE-BF83-39F893688D1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A80C0F3-F3F0-4BC6-92F8-131F3F875E34", "versionEndIncluding": "c.1.0-beta8", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*", "matchCriteriaId": "526991C1-D07E-465C-A609-704C19F8096A", "versionEndIncluding": "c.1.0beta7", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7C58E6B-AECC-48AF-8059-61772690776A", "versionEndIncluding": "1.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7F13399-5084-40FA-A4AB-D78ED588E434", "versionEndIncluding": "1.4.18", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:*:rc-2:*:*:*:*:*:*", "matchCriteriaId": "F4AB8D8F-15AC-4516-85A2-B5D2B5B3DF04", "versionEndIncluding": "1.4.19", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*", "matchCriteriaId": "53B339C1-272B-4A7E-A342-8BBD9DC82826", "versionEndIncluding": "1.6.0_beta5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:s800i:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D1E04DC-AE6A-4536-8E45-36494E51B036", "versionEndIncluding": "1.1.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in Asterisk Open Source 1.4.x before 1.4.18.1 and 1.4.19-rc3, Open Source 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6.1, AsteriskNOW 1.0.x before 1.0.2, Appliance Developer Kit before 1.4 revision 109386, and s800i 1.1.x before 1.1.0.2 allow remote attackers to (1) write a zero to an arbitrary memory location via a large RTP payload number, related to the ast_rtp_unset_m_type function in main/rtp.c; or (2) write certain integers to an arbitrary memory location via a large number of RTP payloads, related to the process_sdp function in channels/chan_sip.c." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer en Asterisk Open Source 1.4.x antes de 1.4.18.1 y 1.4.19-rc3, Open Source 1.6.x antes de 1.6.0-beta6, Business Edition C.x.x antes de C.1.6.1, AsteriskNOW 1.0.x antes de 1.0.2, Appliance Developer Kit antes de 1.4 revisi\u00f3n 109386 y s800i 1.1.x antes de 1.1.0.2 permite a atacantes remotos (1) escribir un cero en una posici\u00f3n de memoria de su elecci\u00f3n a trav\u00e9s de un n\u00famero de carga \u00fatil (payload) RTP grande, relacionada con la funci\u00f3n ast_rtp_unset_m_type en main/rtp.c; o (2) escribir ciertos enteros en una posici\u00f3n de memoria de su elecci\u00f3n a trav\u00e9s de un n\u00famero grande de cargas \u00fatiles RTP, relacionadas con la funci\u00f3n process_sdp en channels/chan_sip.c." } ], "id": "CVE-2008-1289", "lastModified": "2024-11-21T00:44:10.863", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-03-24T17:44:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://downloads.digium.com/pub/security/AST-2008-002.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://labs.musecurity.com/advisories/MU-200803-01.txt" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29426" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/29470" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3763" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1019628" }, { "source": "cve@mitre.org", "url": "http://www.asterisk.org/node/48466" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/489817/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/28308" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/0928" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41302" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41305" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://downloads.digium.com/pub/security/AST-2008-002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://labs.musecurity.com/advisories/MU-200803-01.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29426" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29470" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3763" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1019628" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.asterisk.org/node/48466" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/489817/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/28308" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0928" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41302" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41305" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-07-18 17:30
Modified
2024-11-21 00:34
Severity ?
Summary
The Skinny channel driver (chan_skinny) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a certain data length value in a crafted packet, which results in an "overly large memcpy."
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
asterisk | asterisk | 1.0 | |
asterisk | asterisk | 1.0.6 | |
asterisk | asterisk | 1.0.7 | |
asterisk | asterisk | 1.0.8 | |
asterisk | asterisk | 1.0.9 | |
asterisk | asterisk | 1.0.10 | |
asterisk | asterisk | 1.0.11 | |
asterisk | asterisk | 1.0.12 | |
asterisk | asterisk | 1.2.0_beta1 | |
asterisk | asterisk | 1.2.0_beta2 | |
asterisk | asterisk | 1.2.5 | |
asterisk | asterisk | 1.2.6 | |
asterisk | asterisk | 1.2.7 | |
asterisk | asterisk | 1.2.8 | |
asterisk | asterisk | 1.2.9 | |
asterisk | asterisk | 1.2.10 | |
asterisk | asterisk | 1.2.11 | |
asterisk | asterisk | 1.2.12 | |
asterisk | asterisk | 1.2.13 | |
asterisk | asterisk | 1.2.14 | |
asterisk | asterisk | 1.2.15 | |
asterisk | asterisk | 1.2.16 | |
asterisk | asterisk | 1.2.17 | |
asterisk | asterisk | 1.4.1 | |
asterisk | asterisk | 1.4.2 | |
asterisk | asterisk | 1.4.4_2007-04-27 | |
asterisk | asterisk | 1.4_beta | |
asterisk | asterisk | a | |
asterisk | asterisk | b.1.3.2 | |
asterisk | asterisk | b.1.3.3 | |
asterisk | asterisk | b.2.2.0 | |
asterisk | asterisk_appliance_developer_kit | * | |
asterisk | asterisknow | beta_5 | |
asterisk | asterisknow | beta_6 | |
asterisk | s800i_appliance | 1.0 | |
asterisk | s800i_appliance | 1.0.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "54F50B72-EFB3-448F-A2B8-C2BE4D4BF341", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "69BE50A7-FCA8-470A-B212-A516224306EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E306F943-ECA2-41C8-8C5D-F6A3D68ECE79", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3C309D90-24ED-4DC7-A770-783A7E28705F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "1B6DFD0D-86CE-4423-A0F4-C3581F916038", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "77255177-4EB2-47F5-8B3A-F6164C3C8173", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "2145ECD7-D734-4D58-8474-2F38DF9DB94F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "38C3AAB7-EA93-40BA-8ADE-380DA3520747", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta1:*:*:*:*:*:*:*", "matchCriteriaId": "E97310AF-E163-4C4F-A0BE-2940A67C336B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta2:*:*:*:*:*:*:*", "matchCriteriaId": "66A7A018-4EB6-4C15-9A22-E4299A6919C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "A7A7F90E-4600-4058-BB10-E39BE8F4968F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "5722AD0B-B329-4DA3-A251-A18DD6EE505E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "18B8E66C-B2EB-4F1F-9226-07A957885D8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "ECD3CBC1-1371-440A-9EA1-7495A4FA2C49", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "1B4841AD-96B7-4518-AC3E-3D23C88C083B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "C89A173C-C64A-440F-BCC6-EDE692521171", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "C716CAB8-5F2D-44DA-982B-3A47B3B59A1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "F0FABB45-93A9-49BB-93DA-D13305E2FF84", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "A5F82331-A7C1-4166-AE45-A83BD7FC3D25", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "26A10E99-3A8C-430A-8FB6-4A55E01A00E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "E5DF84B2-A104-4FA2-8B02-D243D76ACEE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "B4BA2270-DF93-48FB-A90F-DFBFED05F051", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "B4FE0264-95E4-4B75-8904-369035DEA2F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "593AA737-5AF3-4F7C-B74B-D3F37701C435", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "D942B911-979A-4AC3-93D6-07E420171E77", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.4_2007-04-27:*:*:*:*:*:*:*", "matchCriteriaId": "465DB1C7-D5DD-4A2D-8506-8642AB8363C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*", "matchCriteriaId": "181C8E98-2138-4BFC-B6B0-1DA270AEE7F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:a:*:business:*:*:*:*:*", "matchCriteriaId": "C6702046-43CF-4C84-9F76-24716C9F7D20", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.2:*:business:*:*:*:*:*", "matchCriteriaId": "524CF00B-1B36-4C1F-80B4-28349891669B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.3:*:business:*:*:*:*:*", "matchCriteriaId": "2942FA48-42CE-4E67-A5BF-7852652EDE28", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.2.0:*:business:*:*:*:*:*", "matchCriteriaId": "4160A834-9194-474C-819B-60627E470D13", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C150564-406F-4B49-AEF8-0F2887738E4D", "versionEndIncluding": "0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:*", "matchCriteriaId": "B12A09BE-1EE0-46D5-B3F0-E8847409A49A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:*", "matchCriteriaId": "7A5A734E-1DD3-4924-8AC1-97048FA3270F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9282AC42-E98A-4BC2-B46D-15B5776C961F", "vulnerable": true }, { "criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "83DBFD69-2500-46C1-827C-1493CF896F49", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Skinny channel driver (chan_skinny) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a certain data length value in a crafted packet, which results in an \"overly large memcpy.\"" }, { "lang": "es", "value": "El controlador de canal Skinny (chan_skinny) en Asterisk anterior a 1.2.22 y 1.4.x anterior a 1.4.8, Business Edition anterior a B.2.2.1, AsteriskNOW anterior a la beta7, Appliance Developer Kit anterior a 0.5.0, y s800i anterior a 1.0.2 permite a atacantes remotos provocar denegaci\u00f3n de servicio (caida) a trav\u00e9s de ciertos valores de longitudes de datos en un paquete manipulado, lo cual deriva en un \"copia de memoria demasiado larga\"." } ], "id": "CVE-2007-3764", "lastModified": "2024-11-21T00:34:00.803", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-07-18T17:30:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-016.pdf" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/26099" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/29051" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2007/dsa-1358" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/24950" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018407" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35478" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-016.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26099" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29051" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2007/dsa-1358" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/24950" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018407" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35478" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-07-18 17:30
Modified
2024-11-21 00:34
Severity ?
Summary
The IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted (1) LAGRQ or (2) LAGRP frame that contains information elements of IAX frames, which results in a NULL pointer dereference when Asterisk does not properly set an associated variable.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
asterisk | asterisk | 1.0 | |
asterisk | asterisk | 1.0.6 | |
asterisk | asterisk | 1.0.7 | |
asterisk | asterisk | 1.0.8 | |
asterisk | asterisk | 1.0.9 | |
asterisk | asterisk | 1.0.10 | |
asterisk | asterisk | 1.0.11 | |
asterisk | asterisk | 1.0.12 | |
asterisk | asterisk | 1.2.0_beta1 | |
asterisk | asterisk | 1.2.0_beta2 | |
asterisk | asterisk | 1.2.5 | |
asterisk | asterisk | 1.2.6 | |
asterisk | asterisk | 1.2.7 | |
asterisk | asterisk | 1.2.8 | |
asterisk | asterisk | 1.2.9 | |
asterisk | asterisk | 1.2.10 | |
asterisk | asterisk | 1.2.11 | |
asterisk | asterisk | 1.2.12 | |
asterisk | asterisk | 1.2.13 | |
asterisk | asterisk | 1.2.14 | |
asterisk | asterisk | 1.2.15 | |
asterisk | asterisk | 1.2.16 | |
asterisk | asterisk | 1.2.17 | |
asterisk | asterisk | 1.4.1 | |
asterisk | asterisk | 1.4.2 | |
asterisk | asterisk | 1.4.4_2007-04-27 | |
asterisk | asterisk | 1.4_beta | |
asterisk | asterisk | a | |
asterisk | asterisk | b.1.3.2 | |
asterisk | asterisk | b.1.3.3 | |
asterisk | asterisk | b.2.2.0 | |
asterisk | asterisk_appliance_developer_kit | * | |
asterisk | asterisknow | beta_5 | |
asterisk | asterisknow | beta_6 | |
asterisk | s800i_appliance | 1.0 | |
asterisk | s800i_appliance | 1.0.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "54F50B72-EFB3-448F-A2B8-C2BE4D4BF341", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "69BE50A7-FCA8-470A-B212-A516224306EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E306F943-ECA2-41C8-8C5D-F6A3D68ECE79", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3C309D90-24ED-4DC7-A770-783A7E28705F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "1B6DFD0D-86CE-4423-A0F4-C3581F916038", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "77255177-4EB2-47F5-8B3A-F6164C3C8173", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "2145ECD7-D734-4D58-8474-2F38DF9DB94F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "38C3AAB7-EA93-40BA-8ADE-380DA3520747", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta1:*:*:*:*:*:*:*", "matchCriteriaId": "E97310AF-E163-4C4F-A0BE-2940A67C336B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta2:*:*:*:*:*:*:*", "matchCriteriaId": "66A7A018-4EB6-4C15-9A22-E4299A6919C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "A7A7F90E-4600-4058-BB10-E39BE8F4968F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "5722AD0B-B329-4DA3-A251-A18DD6EE505E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "18B8E66C-B2EB-4F1F-9226-07A957885D8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "ECD3CBC1-1371-440A-9EA1-7495A4FA2C49", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "1B4841AD-96B7-4518-AC3E-3D23C88C083B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "C89A173C-C64A-440F-BCC6-EDE692521171", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "C716CAB8-5F2D-44DA-982B-3A47B3B59A1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "F0FABB45-93A9-49BB-93DA-D13305E2FF84", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "A5F82331-A7C1-4166-AE45-A83BD7FC3D25", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "26A10E99-3A8C-430A-8FB6-4A55E01A00E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "E5DF84B2-A104-4FA2-8B02-D243D76ACEE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "B4BA2270-DF93-48FB-A90F-DFBFED05F051", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "B4FE0264-95E4-4B75-8904-369035DEA2F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "593AA737-5AF3-4F7C-B74B-D3F37701C435", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "D942B911-979A-4AC3-93D6-07E420171E77", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.4_2007-04-27:*:*:*:*:*:*:*", "matchCriteriaId": "465DB1C7-D5DD-4A2D-8506-8642AB8363C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*", "matchCriteriaId": "181C8E98-2138-4BFC-B6B0-1DA270AEE7F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:a:*:business:*:*:*:*:*", "matchCriteriaId": "C6702046-43CF-4C84-9F76-24716C9F7D20", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.2:*:business:*:*:*:*:*", "matchCriteriaId": "524CF00B-1B36-4C1F-80B4-28349891669B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.3:*:business:*:*:*:*:*", "matchCriteriaId": "2942FA48-42CE-4E67-A5BF-7852652EDE28", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.2.0:*:business:*:*:*:*:*", "matchCriteriaId": "4160A834-9194-474C-819B-60627E470D13", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C150564-406F-4B49-AEF8-0F2887738E4D", "versionEndIncluding": "0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:*", "matchCriteriaId": "B12A09BE-1EE0-46D5-B3F0-E8847409A49A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:*", "matchCriteriaId": "7A5A734E-1DD3-4924-8AC1-97048FA3270F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9282AC42-E98A-4BC2-B46D-15B5776C961F", "vulnerable": true }, { "criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "83DBFD69-2500-46C1-827C-1493CF896F49", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted (1) LAGRQ or (2) LAGRP frame that contains information elements of IAX frames, which results in a NULL pointer dereference when Asterisk does not properly set an associated variable." }, { "lang": "es", "value": "El gestor de dispositivo de canal IAX2 (chan_iax2) en Asterisk versiones anteriores a 1.2.22 y 1.4.x versiones anteriores a 1.4.8, Business Edition versiones anteriores a B.2.2.1, AsteriskNOW versiones anteriores a beta7, Appliance Developer Kit versiones anteriores a 0.5.0, y s800i versiones anteriores a 1.0.2 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante tramas (1) LAGRQ \u00f3 (2) LAGRP que contienen elementos de informaci\u00f3n de tramas IAX, que resulta en una referencia a puntero NULL cuando Asterisk no asigna apropiadamente una variable asociado." } ], "id": "CVE-2007-3763", "lastModified": "2024-11-21T00:34:00.643", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-07-18T17:30:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-015.pdf" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/26099" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/29051" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2007/dsa-1358" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/24950" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018407" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-015.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26099" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29051" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2007/dsa-1358" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/24950" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018407" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2563" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-07-18 17:30
Modified
2024-11-21 00:34
Severity ?
Summary
The STUN implementation in Asterisk 1.4.x before 1.4.8, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted STUN length attribute in a STUN packet sent on an RTP port.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
asterisk | asterisk | 1.0 | |
asterisk | asterisk | 1.0.6 | |
asterisk | asterisk | 1.0.7 | |
asterisk | asterisk | 1.0.8 | |
asterisk | asterisk | 1.0.9 | |
asterisk | asterisk | 1.0.10 | |
asterisk | asterisk | 1.0.11 | |
asterisk | asterisk | 1.0.12 | |
asterisk | asterisk | 1.2.0_beta1 | |
asterisk | asterisk | 1.2.0_beta2 | |
asterisk | asterisk | 1.2.5 | |
asterisk | asterisk | 1.2.6 | |
asterisk | asterisk | 1.2.7 | |
asterisk | asterisk | 1.2.8 | |
asterisk | asterisk | 1.2.9 | |
asterisk | asterisk | 1.2.10 | |
asterisk | asterisk | 1.2.11 | |
asterisk | asterisk | 1.2.12 | |
asterisk | asterisk | 1.2.13 | |
asterisk | asterisk | 1.2.14 | |
asterisk | asterisk | 1.2.15 | |
asterisk | asterisk | 1.2.16 | |
asterisk | asterisk | 1.2.17 | |
asterisk | asterisk | 1.4.1 | |
asterisk | asterisk | 1.4.2 | |
asterisk | asterisk | 1.4.4_2007-04-27 | |
asterisk | asterisk | 1.4_beta | |
asterisk | asterisk | a | |
asterisk | asterisk | b.1.3.2 | |
asterisk | asterisk | b.1.3.3 | |
asterisk | asterisk | b.2.2.0 | |
asterisk | asterisk_appliance_developer_kit | * | |
asterisk | asterisknow | beta_5 | |
asterisk | asterisknow | beta_6 | |
asterisk | s800i_appliance | 1.0 | |
asterisk | s800i_appliance | 1.0.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "54F50B72-EFB3-448F-A2B8-C2BE4D4BF341", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "69BE50A7-FCA8-470A-B212-A516224306EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E306F943-ECA2-41C8-8C5D-F6A3D68ECE79", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3C309D90-24ED-4DC7-A770-783A7E28705F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "1B6DFD0D-86CE-4423-A0F4-C3581F916038", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "77255177-4EB2-47F5-8B3A-F6164C3C8173", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "2145ECD7-D734-4D58-8474-2F38DF9DB94F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "38C3AAB7-EA93-40BA-8ADE-380DA3520747", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta1:*:*:*:*:*:*:*", "matchCriteriaId": "E97310AF-E163-4C4F-A0BE-2940A67C336B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta2:*:*:*:*:*:*:*", "matchCriteriaId": "66A7A018-4EB6-4C15-9A22-E4299A6919C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "A7A7F90E-4600-4058-BB10-E39BE8F4968F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "5722AD0B-B329-4DA3-A251-A18DD6EE505E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "18B8E66C-B2EB-4F1F-9226-07A957885D8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "ECD3CBC1-1371-440A-9EA1-7495A4FA2C49", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "1B4841AD-96B7-4518-AC3E-3D23C88C083B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "C89A173C-C64A-440F-BCC6-EDE692521171", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "C716CAB8-5F2D-44DA-982B-3A47B3B59A1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "F0FABB45-93A9-49BB-93DA-D13305E2FF84", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "A5F82331-A7C1-4166-AE45-A83BD7FC3D25", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "26A10E99-3A8C-430A-8FB6-4A55E01A00E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "E5DF84B2-A104-4FA2-8B02-D243D76ACEE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "B4BA2270-DF93-48FB-A90F-DFBFED05F051", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "B4FE0264-95E4-4B75-8904-369035DEA2F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "593AA737-5AF3-4F7C-B74B-D3F37701C435", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "D942B911-979A-4AC3-93D6-07E420171E77", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.4_2007-04-27:*:*:*:*:*:*:*", "matchCriteriaId": "465DB1C7-D5DD-4A2D-8506-8642AB8363C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*", "matchCriteriaId": "181C8E98-2138-4BFC-B6B0-1DA270AEE7F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:a:*:business:*:*:*:*:*", "matchCriteriaId": "C6702046-43CF-4C84-9F76-24716C9F7D20", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.2:*:business:*:*:*:*:*", "matchCriteriaId": "524CF00B-1B36-4C1F-80B4-28349891669B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.3:*:business:*:*:*:*:*", "matchCriteriaId": "2942FA48-42CE-4E67-A5BF-7852652EDE28", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.2.0:*:business:*:*:*:*:*", "matchCriteriaId": "4160A834-9194-474C-819B-60627E470D13", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C150564-406F-4B49-AEF8-0F2887738E4D", "versionEndIncluding": "0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:*", "matchCriteriaId": "B12A09BE-1EE0-46D5-B3F0-E8847409A49A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:*", "matchCriteriaId": "7A5A734E-1DD3-4924-8AC1-97048FA3270F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9282AC42-E98A-4BC2-B46D-15B5776C961F", "vulnerable": true }, { "criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "83DBFD69-2500-46C1-827C-1493CF896F49", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The STUN implementation in Asterisk 1.4.x before 1.4.8, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted STUN length attribute in a STUN packet sent on an RTP port." }, { "lang": "es", "value": "La implementaci\u00f3n STUN en Asterisk 1.4.x anterior a 1.4.8, AsteriskNOW anterior a beta7, Appliance Developer Kit anterior a 0.5.0, y s800i anterior a 1.0.2 permite a atacantes remotos provocar denegaci\u00f3n de servicio (caida) a trav\u00e9s de una longitud de atributo manipulado STUN en un paquete STUN enviado a un puerto RTP." } ], "id": "CVE-2007-3765", "lastModified": "2024-11-21T00:34:00.980", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-07-18T17:30:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-017.pdf" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/26099" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/24950" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018407" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35480" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-017.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26099" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/24950" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018407" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35480" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-08-22 01:17
Modified
2024-11-21 00:35
Severity ?
Summary
The SIP channel driver (chan_sip) in Asterisk Open Source 1.4.x before 1.4.11, AsteriskNOW before beta7, Asterisk Appliance Developer Kit 0.x before 0.8.0, and s800i (Asterisk Appliance) 1.x before 1.0.3 allows remote attackers to cause a denial of service (memory exhaustion) via a SIP dialog that causes a large number of history entries to be created.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
asterisk | asterisk | * | |
asterisk | asterisk_appliance_developer_kit | * | |
asterisk | asterisknow | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:asterisk:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "28786BB7-9F94-4193-81FC-83B836B9B530", "versionEndIncluding": "1.4.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8C03D5E-5EBE-42C9-BA54-10F1ED76D61C", "versionEndIncluding": "0.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:*:*:*:*:*:*:*:*", "matchCriteriaId": "C896A32E-906D-4AD0-A00B-11DC064CBA6E", "versionEndIncluding": "beta_6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SIP channel driver (chan_sip) in Asterisk Open Source 1.4.x before 1.4.11, AsteriskNOW before beta7, Asterisk Appliance Developer Kit 0.x before 0.8.0, and s800i (Asterisk Appliance) 1.x before 1.0.3 allows remote attackers to cause a denial of service (memory exhaustion) via a SIP dialog that causes a large number of history entries to be created." }, { "lang": "es", "value": "El controlador de canal SIP (chan_sip) en Asterisk Open Source 1.4.x anterior a 1.4.11, AsteriskNOW anterior a beta7, Asterisk Appliance Developer Kit 0.x anterior a 0.8.0, y s800i (Asterisk Appliance) 1.x anterior a 1.0.3 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (agotamiento de memoria) mediante un di\u00e1logo SIP que provoca que se cree un gran n\u00famero de entradas de hist\u00f3rico." } ], "id": "CVE-2007-4455", "lastModified": "2024-11-21T00:35:38.570", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-08-22T01:17:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://downloads.digium.com/pub/asa/AST-2007-020.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2007/Aug/0393.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/26553" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3047" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/25392" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018595" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2953" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36145" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://downloads.digium.com/pub/asa/AST-2007-020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2007/Aug/0393.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26553" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3047" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/25392" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018595" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2953" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36145" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-07-24 15:41
Modified
2024-11-21 00:48
Severity ?
Summary
The FWDOWNL firmware-download implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (traffic amplification) via an IAX2 FWDOWNL request.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9282AC42-E98A-4BC2-B46D-15B5776C961F", "vulnerable": false }, { "criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "83DBFD69-2500-46C1-827C-1493CF896F49", "vulnerable": false }, { "criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F53C8D19-507A-45B6-9B19-C733460F0739", "vulnerable": false }, { "criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "09AEF231-3438-420E-B2B0-1B876A929033", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C05B437-C292-4AA0-8AFE-1CA07CD80034", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "0102C4C0-1A7D-4AB7-9817-44E6B0DB761E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "81DDF486-4185-48EE-869E-0AA6726C31F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "CF45A8E1-F6B1-42BD-9168-12062FA6EAEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "C5757B9B-2759-439A-9A6D-CCDD6C8C8940", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E4548D39-0562-4946-AA51-A7C1A31AEE8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "FCD71268-EAA2-477B-8AC4-DE4853A262B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "529B2115-A191-4F3F-8F8C-A38B7C45463A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:a:*:*:*:*:*:*:*", "matchCriteriaId": "313B3A38-8DEA-4D62-A1A4-0B6011E81870", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b:*:*:*:*:*:*:*", "matchCriteriaId": "B24F3283-4809-40B1-8166-9D1C3A4C9104", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "802F8680-AB38-41AF-BFC8-F6927F6B1626", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "BCAE8D90-B032-4C60-B487-BE655D00FFAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "AB64A872-B7B8-46A8-81E4-49EDAC160531", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "21000270-C9B9-430C-A252-763887A15835", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "12F7CF45-5482-4947-8F1D-48C746987475", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "7B64995D-7892-49AB-A89D-A5D15615C5D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "0397DBD4-EA00-444A-9008-4932F99DF325", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "6FCD865F-BC39-4255-A797-6E5945773337", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "D7203093-7209-4184-92CB-08AD73FAC379", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E4956871-4DD3-4299-8BEB-9D98A4449A42", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "0F04F844-79C4-41F3-9671-8B46460D0AAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "8936B494-E647-498B-8380-AE4DAD458533", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "1B234F33-5233-42A3-B95A-3A3558B4DDCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c:*:*:*:*:*:*:*", "matchCriteriaId": "4D47534E-8EBC-44B5-8770-65BBA7C3F3DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta7:*:*:*:*:*:*:*", "matchCriteriaId": "5BC80EBD-14D3-44A6-A06F-0549722E0EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta8:*:*:*:*:*:*:*", "matchCriteriaId": "7859797F-E9AD-4429-BD2C-A24EC24A5D03", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "E5C988FD-CFB9-4763-BE5A-B89FB3538FD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "00A6DAD0-D4C3-4A58-A35A-991E04B50EC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "6413B123-65DE-4483-A8A0-F5F30A809570", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "502AEBA1-2A6D-4367-86AB-F2948207FCA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "93DA4919-A365-48B6-84D6-6A7D97941A13", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:*", "matchCriteriaId": "B12A09BE-1EE0-46D5-B3F0-E8847409A49A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:*", "matchCriteriaId": "7A5A734E-1DD3-4924-8AC1-97048FA3270F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:beta_7:*:*:*:*:*:*:*", "matchCriteriaId": "3AE2F09E-4B5A-4EDF-A48A-BCBBAA80156B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:pre-release:*:*:*:*:*:*:*", "matchCriteriaId": "F420EB4D-5B9C-4BBA-AAC5-5E0E83CD1F74", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "678DB154-4363-42FF-8B28-367923FC6595", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "E8F2C378-FF0E-4765-9F66-625C4064D5CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "A55A9295-F632-4856-90A1-38371EB98589", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7FAE6AF1-884D-41F7-B174-9E13C7719C99", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DCA9E35B-9A6B-42F2-9315-9C7D09F62227", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "89B1F293-4F0F-48FD-A1F1-1230B94D87D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DDF7EC20-A424-45E5-B7E4-3CC86075858C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "C790E105-55C8-4CDC-9FA8-E1FF6F130A67", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "44C860EF-2B29-4995-B942-000CC43FDD14", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "1ADB80EF-C724-44BA-88FC-24087799D0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "78B39BE8-7E2D-42DF-8633-44CAD5662777", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "F39036E3-0027-4C72-9DEB-9A6E2B4512C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "A037E6F9-3EF7-4EEB-AC16-081421BCE40D", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "6A7EC02A-9C9E-4589-BBB3-1908D3078A7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "6C70FA9C-6F3B-4BDF-97FB-81D06AB0EE65", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9F7971E1-F136-4ADC-95EC-BC4F92E838CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0beta1:*:*:*:*:*:*:*", "matchCriteriaId": "7435F043-F92B-4635-93CC-A2C39AAE1BCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0beta2:*:*:*:*:*:*:*", "matchCriteriaId": "C7B2F43B-8B69-4BF6-86B7-A225175FF068", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "27202966-2C41-4964-9497-1887D2A834C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1471B5A2-15BE-4E7C-BA49-2E6002F7C8EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "7108D72F-5AFD-4EEF-B2A9-CA4FA792E193", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "107DA2D8-FE7C-4B70-856D-43D58B988694", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "ABD71DD9-8A15-45E2-9FB3-F0544D7E1B80", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "5C14614F-4E27-40A6-9E56-2B1DBB10330B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "7A2F2F5A-66FD-4057-917C-66332A88D83E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "399B0206-B48B-46EF-8CA6-A6E5A2550B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "26E9760F-C0EB-47BB-8DA4-CC7815099DAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "4C510A9A-C3E2-4AF8-9919-1A22E918CDEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "6BD915CD-A7D3-4305-A6C0-290C648A226C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "9E79CCE5-C29B-4726-8D2F-BC20F70959BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "F29C13DB-6F04-4B41-90A2-2408D70F3641", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "0F4F734E-0E78-4957-B323-8E9FBA7FF15C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A4B117B-E945-4033-A79D-10DFAA3DF18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EA6D866F-8189-4FFD-AA24-47C0A015C246", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "A4EBFB79-C269-4132-BFAB-451F66CE8289", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "E9E1028E-2C07-4BA3-B891-FA853A87B280", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "9E74F577-70BD-4FAF-BCFD-10CD21FC5601", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "57BB03E2-E61C-4A94-82DF-8720698CE271", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "1B30A36F-5CE6-4246-8752-176FB5999C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "E0F76DFD-4DAC-4B02-8967-B242CDEEF6C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "6A59BC20-3217-4584-9196-D1CD9E0D6B52", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:*", "matchCriteriaId": "56F728BA-FC9E-4EEE-9A08-C9C7433BD8D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C64DF29-5B3D-401E-885E-8E37FD577254", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A7BF52A-2FF8-40ED-B757-28A1101DE8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:*", "matchCriteriaId": "7A321C2D-852B-4498-ADD6-79956410AB94", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:*", "matchCriteriaId": "9D5F0DCF-C6A2-4A09-90C9-D70F174FDEF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:*", "matchCriteriaId": "C820538E-14EC-43C1-80DB-6AAE4905EF0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26:*:*:*:*:*:*:*", "matchCriteriaId": "E9562112-2505-4F78-86DE-F30EFAEE47D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A6D8FD0-C8C1-4868-9AF1-96B1949C18AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:*", "matchCriteriaId": "72A840B4-216B-4063-997F-791FBC8C8658", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.27:*:*:*:*:*:*:*", "matchCriteriaId": "BE47A547-26E7-48F9-B0A6-2F65E04A1EDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.28:*:*:*:*:*:*:*", "matchCriteriaId": "E1AEB744-FCF2-4A41-8866-9D1D20E6C6B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.29:*:*:*:*:*:*:*", "matchCriteriaId": "51E5EB34-30AD-4E81-8BD4-4AB905E52B82", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "967DF432-DEF4-4FA2-8C8D-19A7FB663A33", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "295D4042-2D3C-481B-B969-2DDAC1161198", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "99E9EE2A-56AD-42BC-8CB0-D34091849B0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "96877A3E-B54B-4F31-B281-76CDC98B2D02", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "6D0B4503-42A6-4D88-954E-A662E91EC204", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "A4B73813-BCD8-429E-B9B9-D6665E026BC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "5BBA3ECC-4F40-41CD-A6D7-BBD680DDBACC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "9CBE2156-AF86-4C72-B33D-3FF83930F828", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "61408884-FBBF-4D94-A552-F99AB46DCED6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "4A527277-D97D-4B74-906F-7481BDBD96D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "D8B57A32-7B83-4783-A244-C26301970444", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "044FD0D0-FC92-4A01-B0D4-11A703EF21FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "3477EC1A-9634-492C-B052-35770A9C9F4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "1C90F104-FA2C-4091-B149-1774AC982C0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "C9328768-7C08-4143-B5F8-F5C2D735D21A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "6C04E2B3-094B-4828-A2FC-BB66244A9F73", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "4BDE3D31-4BB2-45A3-B085-8C91152A3152", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "CE0107D4-395E-45F1-B963-7618CCC007D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "53B8E11B-4984-45A8-A107-D276205988B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "2495DB98-F923-4E60-86EC-2DBB7A98C90C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "E186D125-996E-4900-A2B8-5CDC8B5D5136", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "27DC6CF7-4DF8-4472-A684-8CCB5E26FCFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "88576385-EF03-408B-9775-B52E6AFFE48A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "1A838577-2BA1-4792-8B69-6FB07FFD7727", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "CDEED3E1-13E0-46E6-8AAB-D24D2D04AE4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:*:*:*:*:*:*:*", "matchCriteriaId": "ED2BF36F-CF10-4F24-970B-3D0BB7561C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "FB1593E1-BF21-4DB9-A18E-9F221F3F9022", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19_rc3:*:*:*:*:*:*:*", "matchCriteriaId": "2D41604A-21CB-4EF3-85E8-8CD170C8013F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4_revision_95946:*:*:*:*:*:*:*", "matchCriteriaId": "E3C6272B-D0C4-4EA5-AEE4-5A45DAA2DDE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4beta:*:*:*:*:*:*:*", "matchCriteriaId": "2A8012CE-4D4B-4131-87E7-16D7907E3BB3", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The FWDOWNL firmware-download implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (traffic amplification) via an IAX2 FWDOWNL request." }, { "lang": "es", "value": "La implementaci\u00f3n FWDOWNL firmware-download en Asterisk Open Source 1.0.x, 1.2.x antes de 1.2.30 y 1.4.x antes de 1.4.21.2; Business Edition A.x.x, B.x.x antes de B.2.5.4 y C.x.x antes de C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; y s800i 1.0.x antes de 1.2.0.1 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (amplificaci\u00f3n del tr\u00e1fico) mediante una petici\u00f3n IAX2 FWDOWNL." } ], "id": "CVE-2008-3264", "lastModified": "2024-11-21T00:48:50.417", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-07-24T15:41:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://downloads.digium.com/pub/security/AST-2008-011.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31178" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/31194" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/34982" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200905-01.xml" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/494676/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/30350" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1020536" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/2168/references" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43955" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://downloads.digium.com/pub/security/AST-2008-011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31178" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31194" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34982" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200905-01.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/494676/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/30350" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1020536" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2168/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43955" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-08-09 21:17
Modified
2024-11-21 00:35
Severity ?
Summary
The Skinny channel driver (chan_skinny) in Asterisk Open Source before 1.4.10, AsteriskNOW before beta7, Appliance Developer Kit before 0.7.0, and Appliance s800i before 1.0.3 allows remote authenticated users to cause a denial of service (application crash) via a CAPABILITIES_RES_MESSAGE packet with a capabilities count larger than the capabilities_res_message array population.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
asterisk | asterisk | * | |
asterisk | asterisk_appliance_developer_kit | * | |
asterisk | asterisknow | * | |
asterisk | s800i | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:asterisk:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "28786BB7-9F94-4193-81FC-83B836B9B530", "versionEndIncluding": "1.4.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*", "matchCriteriaId": "39776C64-0067-4EBD-A5DD-6B7FB17B7603", "versionEndIncluding": "0.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:*:*:*:*:*:*:*:*", "matchCriteriaId": "C896A32E-906D-4AD0-A00B-11DC064CBA6E", "versionEndIncluding": "beta_6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:s800i:*:*:*:*:*:*:*:*", "matchCriteriaId": "4CE11A7E-2893-47E4-897B-28BBAD984858", "versionEndIncluding": "1.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Skinny channel driver (chan_skinny) in Asterisk Open Source before 1.4.10, AsteriskNOW before beta7, Appliance Developer Kit before 0.7.0, and Appliance s800i before 1.0.3 allows remote authenticated users to cause a denial of service (application crash) via a CAPABILITIES_RES_MESSAGE packet with a capabilities count larger than the capabilities_res_message array population." }, { "lang": "es", "value": "El dispositivo de canal Skinny (chan_skinny) en el Asterisk Open Source anterior al 1.4.10, el AsteriskNOW anterior al beta7, el Appliance Developer Kit anterior al 0.7.0 y el Appliance s800i before 1.0.3 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s del paquete CAPABILITIES_RES_MESSAGE con una capacidad de escrutinio mayor que el array capabilities_res_message de poblaci\u00f3n." } ], "id": "CVE-2007-4280", "lastModified": "2024-11-21T00:35:13.280", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-08-09T21:17:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://downloads.digium.com/pub/asa/ASA-2007-019.pdf" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26340" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25228" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018536" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2808" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35870" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://downloads.digium.com/pub/asa/ASA-2007-019.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26340" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25228" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018536" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2808" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35870" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2008-1390
Vulnerability from cvelistv5
Published
2008-03-24 17:00
Modified
2024-08-07 08:17
Severity ?
EPSS score ?
Summary
The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses.
References
▼ | URL | Tags |
---|---|---|
http://securityreason.com/securityalert/3764 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/bid/28316 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/489819/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41304 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/29449 | third-party-advisory, x_refsource_SECUNIA | |
http://downloads.digium.com/pub/security/AST-2008-005.html | x_refsource_CONFIRM | |
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html | vendor-advisory, x_refsource_FEDORA | |
http://www.securitytracker.com/id?1019679 | vdb-entry, x_refsource_SECTRACK | |
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html | vendor-advisory, x_refsource_FEDORA | |
http://secunia.com/advisories/29470 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:17:34.588Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "3764", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3764" }, { "name": "28316", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28316" }, { "name": "20080318 AST-2008-005: HTTP Manager ID is predictable", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/489819/100/0/threaded" }, { "name": "asterisk-httpmanagerid-weak-security(41304)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41304" }, { "name": "29449", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29449" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.digium.com/pub/security/AST-2008-005.html" }, { "name": "FEDORA-2008-2554", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html" }, { "name": "1019679", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019679" }, { "name": "FEDORA-2008-2620", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html" }, { "name": "29470", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29470" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-18T00:00:00", "descriptions": [ { "lang": "en", "value": "The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "3764", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3764" }, { "name": "28316", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28316" }, { "name": "20080318 AST-2008-005: HTTP Manager ID is predictable", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/489819/100/0/threaded" }, { "name": "asterisk-httpmanagerid-weak-security(41304)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41304" }, { "name": "29449", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29449" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.digium.com/pub/security/AST-2008-005.html" }, { "name": "FEDORA-2008-2554", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html" }, { "name": "1019679", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019679" }, { "name": "FEDORA-2008-2620", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html" }, { "name": "29470", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29470" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1390", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "3764", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3764" }, { "name": "28316", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28316" }, { "name": "20080318 AST-2008-005: HTTP Manager ID is predictable", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/489819/100/0/threaded" }, { "name": "asterisk-httpmanagerid-weak-security(41304)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41304" }, { "name": "29449", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29449" }, { "name": "http://downloads.digium.com/pub/security/AST-2008-005.html", "refsource": "CONFIRM", "url": "http://downloads.digium.com/pub/security/AST-2008-005.html" }, { "name": "FEDORA-2008-2554", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html" }, { "name": "1019679", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019679" }, { "name": "FEDORA-2008-2620", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html" }, { "name": "29470", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29470" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1390", "datePublished": "2008-03-24T17:00:00", "dateReserved": "2008-03-18T00:00:00", "dateUpdated": "2024-08-07T08:17:34.588Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1289
Vulnerability from cvelistv5
Published
2008-03-24 17:00
Modified
2024-08-07 08:17
Severity ?
EPSS score ?
Summary
Multiple buffer overflows in Asterisk Open Source 1.4.x before 1.4.18.1 and 1.4.19-rc3, Open Source 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6.1, AsteriskNOW 1.0.x before 1.0.2, Appliance Developer Kit before 1.4 revision 109386, and s800i 1.1.x before 1.1.0.2 allow remote attackers to (1) write a zero to an arbitrary memory location via a large RTP payload number, related to the ast_rtp_unset_m_type function in main/rtp.c; or (2) write certain integers to an arbitrary memory location via a large number of RTP payloads, related to the process_sdp function in channels/chan_sip.c.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:17:34.571Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "28308", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28308" }, { "name": "3763", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3763" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://labs.musecurity.com/advisories/MU-200803-01.txt" }, { "name": "asterisk-rtp-codecpayload-bo(41305)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41305" }, { "name": "1019628", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1019628" }, { "name": "29426", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29426" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.asterisk.org/node/48466" }, { "name": "FEDORA-2008-2554", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html" }, { "name": "20080318 AST-2008-002: Two buffer overflows in RTP Codec Payload Handling", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/489817/100/0/threaded" }, { "name": "ADV-2008-0928", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0928" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.digium.com/pub/security/AST-2008-002.html" }, { "name": "FEDORA-2008-2620", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html" }, { "name": "asterisk-rtppayload-bo(41302)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41302" }, { "name": "29470", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29470" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in Asterisk Open Source 1.4.x before 1.4.18.1 and 1.4.19-rc3, Open Source 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6.1, AsteriskNOW 1.0.x before 1.0.2, Appliance Developer Kit before 1.4 revision 109386, and s800i 1.1.x before 1.1.0.2 allow remote attackers to (1) write a zero to an arbitrary memory location via a large RTP payload number, related to the ast_rtp_unset_m_type function in main/rtp.c; or (2) write certain integers to an arbitrary memory location via a large number of RTP payloads, related to the process_sdp function in channels/chan_sip.c." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "28308", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28308" }, { "name": "3763", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3763" }, { "tags": [ "x_refsource_MISC" ], "url": "http://labs.musecurity.com/advisories/MU-200803-01.txt" }, { "name": "asterisk-rtp-codecpayload-bo(41305)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41305" }, { "name": "1019628", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1019628" }, { "name": "29426", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29426" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.asterisk.org/node/48466" }, { "name": "FEDORA-2008-2554", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html" }, { "name": "20080318 AST-2008-002: Two buffer overflows in RTP Codec Payload Handling", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/489817/100/0/threaded" }, { "name": "ADV-2008-0928", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0928" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.digium.com/pub/security/AST-2008-002.html" }, { "name": "FEDORA-2008-2620", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html" }, { "name": "asterisk-rtppayload-bo(41302)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41302" }, { "name": "29470", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29470" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1289", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in Asterisk Open Source 1.4.x before 1.4.18.1 and 1.4.19-rc3, Open Source 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6.1, AsteriskNOW 1.0.x before 1.0.2, Appliance Developer Kit before 1.4 revision 109386, and s800i 1.1.x before 1.1.0.2 allow remote attackers to (1) write a zero to an arbitrary memory location via a large RTP payload number, related to the ast_rtp_unset_m_type function in main/rtp.c; or (2) write certain integers to an arbitrary memory location via a large number of RTP payloads, related to the process_sdp function in channels/chan_sip.c." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "28308", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28308" }, { "name": "3763", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3763" }, { "name": "http://labs.musecurity.com/advisories/MU-200803-01.txt", "refsource": "MISC", "url": "http://labs.musecurity.com/advisories/MU-200803-01.txt" }, { "name": "asterisk-rtp-codecpayload-bo(41305)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41305" }, { "name": "1019628", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1019628" }, { "name": "29426", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29426" }, { "name": "http://www.asterisk.org/node/48466", "refsource": "CONFIRM", "url": "http://www.asterisk.org/node/48466" }, { "name": "FEDORA-2008-2554", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html" }, { "name": "20080318 AST-2008-002: Two buffer overflows in RTP Codec Payload Handling", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/489817/100/0/threaded" }, { "name": "ADV-2008-0928", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0928" }, { "name": "http://downloads.digium.com/pub/security/AST-2008-002.html", "refsource": "CONFIRM", "url": "http://downloads.digium.com/pub/security/AST-2008-002.html" }, { "name": "FEDORA-2008-2620", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html" }, { "name": "asterisk-rtppayload-bo(41302)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41302" }, { "name": "29470", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29470" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1289", "datePublished": "2008-03-24T17:00:00", "dateReserved": "2008-03-12T00:00:00", "dateUpdated": "2024-08-07T08:17:34.571Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1332
Vulnerability from cvelistv5
Published
2008-03-20 00:00
Modified
2024-08-07 08:17
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:17:34.472Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SUSE-SR:2008:010", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html" }, { "name": "29782", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29782" }, { "name": "GLSA-200804-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200804-13.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.digium.com/pub/security/AST-2008-003.html" }, { "name": "28310", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28310" }, { "name": "20080318 AST-2008-003: Unauthenticated calls allowed from SIP channel driver", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/489818/100/0/threaded" }, { "name": "DSA-1525", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1525" }, { "name": "29426", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29426" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.asterisk.org/node/48466" }, { "name": "FEDORA-2008-2554", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html" }, { "name": "1019629", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1019629" }, { "name": "asterisk-sip-security-bypass(41308)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41308" }, { "name": "ADV-2008-0928", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0928" }, { "name": "FEDORA-2008-2620", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html" }, { "name": "29957", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29957" }, { "name": "29456", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29456" }, { "name": "29470", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29470" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "SUSE-SR:2008:010", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html" }, { "name": "29782", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29782" }, { "name": "GLSA-200804-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200804-13.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.digium.com/pub/security/AST-2008-003.html" }, { "name": "28310", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28310" }, { "name": "20080318 AST-2008-003: Unauthenticated calls allowed from SIP channel driver", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/489818/100/0/threaded" }, { "name": "DSA-1525", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1525" }, { "name": "29426", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29426" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.asterisk.org/node/48466" }, { "name": "FEDORA-2008-2554", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html" }, { "name": "1019629", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1019629" }, { "name": "asterisk-sip-security-bypass(41308)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41308" }, { "name": "ADV-2008-0928", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0928" }, { "name": "FEDORA-2008-2620", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html" }, { "name": "29957", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29957" }, { "name": "29456", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29456" }, { "name": "29470", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29470" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1332", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SUSE-SR:2008:010", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html" }, { "name": "29782", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29782" }, { "name": "GLSA-200804-13", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200804-13.xml" }, { "name": "http://downloads.digium.com/pub/security/AST-2008-003.html", "refsource": "CONFIRM", "url": "http://downloads.digium.com/pub/security/AST-2008-003.html" }, { "name": "28310", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28310" }, { "name": "20080318 AST-2008-003: Unauthenticated calls allowed from SIP channel driver", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/489818/100/0/threaded" }, { "name": "DSA-1525", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1525" }, { "name": "29426", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29426" }, { "name": "http://www.asterisk.org/node/48466", "refsource": "CONFIRM", "url": "http://www.asterisk.org/node/48466" }, { "name": "FEDORA-2008-2554", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html" }, { "name": "1019629", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1019629" }, { "name": "asterisk-sip-security-bypass(41308)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41308" }, { "name": "ADV-2008-0928", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0928" }, { "name": "FEDORA-2008-2620", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html" }, { "name": "29957", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29957" }, { "name": "29456", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29456" }, { "name": "29470", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29470" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1332", "datePublished": "2008-03-20T00:00:00", "dateReserved": "2008-03-13T00:00:00", "dateUpdated": "2024-08-07T08:17:34.472Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-4280
Vulnerability from cvelistv5
Published
2007-08-09 21:00
Modified
2024-08-07 14:46
Severity ?
EPSS score ?
Summary
The Skinny channel driver (chan_skinny) in Asterisk Open Source before 1.4.10, AsteriskNOW before beta7, Appliance Developer Kit before 0.7.0, and Appliance s800i before 1.0.3 allows remote authenticated users to cause a denial of service (application crash) via a CAPABILITIES_RES_MESSAGE packet with a capabilities count larger than the capabilities_res_message array population.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2007/2808 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/26340 | third-party-advisory, x_refsource_SECUNIA | |
http://downloads.digium.com/pub/asa/ASA-2007-019.pdf | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35870 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/25228 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id?1018536 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:46:39.690Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2007-2808", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2808" }, { "name": "26340", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26340" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.digium.com/pub/asa/ASA-2007-019.pdf" }, { "name": "asterisk-skinny-channel-dos(35870)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35870" }, { "name": "25228", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25228" }, { "name": "1018536", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018536" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-08-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The Skinny channel driver (chan_skinny) in Asterisk Open Source before 1.4.10, AsteriskNOW before beta7, Appliance Developer Kit before 0.7.0, and Appliance s800i before 1.0.3 allows remote authenticated users to cause a denial of service (application crash) via a CAPABILITIES_RES_MESSAGE packet with a capabilities count larger than the capabilities_res_message array population." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2007-2808", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2808" }, { "name": "26340", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26340" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.digium.com/pub/asa/ASA-2007-019.pdf" }, { "name": "asterisk-skinny-channel-dos(35870)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35870" }, { "name": "25228", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25228" }, { "name": "1018536", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018536" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4280", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Skinny channel driver (chan_skinny) in Asterisk Open Source before 1.4.10, AsteriskNOW before beta7, Appliance Developer Kit before 0.7.0, and Appliance s800i before 1.0.3 allows remote authenticated users to cause a denial of service (application crash) via a CAPABILITIES_RES_MESSAGE packet with a capabilities count larger than the capabilities_res_message array population." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2007-2808", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2808" }, { "name": "26340", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26340" }, { "name": "http://downloads.digium.com/pub/asa/ASA-2007-019.pdf", "refsource": "CONFIRM", "url": "http://downloads.digium.com/pub/asa/ASA-2007-019.pdf" }, { "name": "asterisk-skinny-channel-dos(35870)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35870" }, { "name": "25228", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25228" }, { "name": "1018536", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018536" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4280", "datePublished": "2007-08-09T21:00:00", "dateReserved": "2007-08-09T00:00:00", "dateUpdated": "2024-08-07T14:46:39.690Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-0095
Vulnerability from cvelistv5
Published
2008-01-08 02:00
Modified
2024-08-07 07:32
Severity ?
EPSS score ?
Summary
The SIP channel driver in Asterisk Open Source 1.4.x before 1.4.17, Business Edition before C.1.0-beta8, AsteriskNOW before beta7, Appliance Developer Kit before Asterisk 1.4 revision 95946, and Appliance s800i 1.0.x before 1.0.3.4 allows remote attackers to cause a denial of service (daemon crash) via a BYE message with an Also (Also transfer) header, which triggers a NULL pointer dereference.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:32:23.897Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "27110", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27110" }, { "name": "FEDORA-2008-0199", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00167.html" }, { "name": "ADV-2008-0019", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0019" }, { "name": "20080102 AST-2008-001: Crash from transfer using BYE with Also header", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/485727/100/0/threaded" }, { "name": "asterisk-bye-also-dos(39361)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39361" }, { "name": "3520", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3520" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.digium.com/view.php?id=11637" }, { "name": "28312", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28312" }, { "name": "1019152", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019152" }, { "name": "FEDORA-2008-0198", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00166.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.digium.com/pub/security/AST-2008-001.html" }, { "name": "28299", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28299" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-01-02T00:00:00", "descriptions": [ { "lang": "en", "value": "The SIP channel driver in Asterisk Open Source 1.4.x before 1.4.17, Business Edition before C.1.0-beta8, AsteriskNOW before beta7, Appliance Developer Kit before Asterisk 1.4 revision 95946, and Appliance s800i 1.0.x before 1.0.3.4 allows remote attackers to cause a denial of service (daemon crash) via a BYE message with an Also (Also transfer) header, which triggers a NULL pointer dereference." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "27110", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27110" }, { "name": "FEDORA-2008-0199", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00167.html" }, { "name": "ADV-2008-0019", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0019" }, { "name": "20080102 AST-2008-001: Crash from transfer using BYE with Also header", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/485727/100/0/threaded" }, { "name": "asterisk-bye-also-dos(39361)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39361" }, { "name": "3520", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3520" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.digium.com/view.php?id=11637" }, { "name": "28312", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28312" }, { "name": "1019152", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019152" }, { "name": "FEDORA-2008-0198", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00166.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.digium.com/pub/security/AST-2008-001.html" }, { "name": "28299", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28299" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0095", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SIP channel driver in Asterisk Open Source 1.4.x before 1.4.17, Business Edition before C.1.0-beta8, AsteriskNOW before beta7, Appliance Developer Kit before Asterisk 1.4 revision 95946, and Appliance s800i 1.0.x before 1.0.3.4 allows remote attackers to cause a denial of service (daemon crash) via a BYE message with an Also (Also transfer) header, which triggers a NULL pointer dereference." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "27110", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27110" }, { "name": "FEDORA-2008-0199", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00167.html" }, { "name": "ADV-2008-0019", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0019" }, { "name": "20080102 AST-2008-001: Crash from transfer using BYE with Also header", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/485727/100/0/threaded" }, { "name": "asterisk-bye-also-dos(39361)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39361" }, { "name": "3520", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3520" }, { "name": "http://bugs.digium.com/view.php?id=11637", "refsource": "MISC", "url": "http://bugs.digium.com/view.php?id=11637" }, { "name": "28312", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28312" }, { "name": "1019152", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019152" }, { "name": "FEDORA-2008-0198", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00166.html" }, { "name": "http://downloads.digium.com/pub/security/AST-2008-001.html", "refsource": "CONFIRM", "url": "http://downloads.digium.com/pub/security/AST-2008-001.html" }, { "name": "28299", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28299" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-0095", "datePublished": "2008-01-08T02:00:00", "dateReserved": "2008-01-07T00:00:00", "dateUpdated": "2024-08-07T07:32:23.897Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-3764
Vulnerability from cvelistv5
Published
2007-07-18 17:00
Modified
2024-08-07 14:28
Severity ?
EPSS score ?
Summary
The Skinny channel driver (chan_skinny) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a certain data length value in a crafted packet, which results in an "overly large memcpy."
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/26099 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/24950 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id?1018407 | vdb-entry, x_refsource_SECTRACK | |
http://security.gentoo.org/glsa/glsa-200802-11.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/29051 | third-party-advisory, x_refsource_SECUNIA | |
http://bugs.gentoo.org/show_bug.cgi?id=185713 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35478 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2007/2563 | vdb-entry, x_refsource_VUPEN | |
http://ftp.digium.com/pub/asa/ASA-2007-016.pdf | x_refsource_CONFIRM | |
http://www.debian.org/security/2007/dsa-1358 | vendor-advisory, x_refsource_DEBIAN | |
http://www.novell.com/linux/security/advisories/2007_15_sr.html | vendor-advisory, x_refsource_SUSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:28:52.239Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "26099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26099" }, { "name": "24950", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24950" }, { "name": "1018407", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018407" }, { "name": "GLSA-200802-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "name": "29051", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29051" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "name": "asterisk-skinny-driver-dos(35478)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35478" }, { "name": "ADV-2007-2563", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-016.pdf" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "SUSE-SR:2007:015", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The Skinny channel driver (chan_skinny) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a certain data length value in a crafted packet, which results in an \"overly large memcpy.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "26099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26099" }, { "name": "24950", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24950" }, { "name": "1018407", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018407" }, { "name": "GLSA-200802-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "name": "29051", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29051" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "name": "asterisk-skinny-driver-dos(35478)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35478" }, { "name": "ADV-2007-2563", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-016.pdf" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "SUSE-SR:2007:015", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3764", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Skinny channel driver (chan_skinny) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a certain data length value in a crafted packet, which results in an \"overly large memcpy.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "26099", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26099" }, { "name": "24950", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24950" }, { "name": "1018407", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018407" }, { "name": "GLSA-200802-11", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "name": "29051", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29051" }, { "name": "http://bugs.gentoo.org/show_bug.cgi?id=185713", "refsource": "CONFIRM", "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "name": "asterisk-skinny-driver-dos(35478)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35478" }, { "name": "ADV-2007-2563", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "name": "http://ftp.digium.com/pub/asa/ASA-2007-016.pdf", "refsource": "CONFIRM", "url": "http://ftp.digium.com/pub/asa/ASA-2007-016.pdf" }, { "name": "DSA-1358", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "SUSE-SR:2007:015", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3764", "datePublished": "2007-07-18T17:00:00", "dateReserved": "2007-07-13T00:00:00", "dateUpdated": "2024-08-07T14:28:52.239Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-4455
Vulnerability from cvelistv5
Published
2007-08-22 01:00
Modified
2024-08-07 14:53
Severity ?
EPSS score ?
Summary
The SIP channel driver (chan_sip) in Asterisk Open Source 1.4.x before 1.4.11, AsteriskNOW before beta7, Asterisk Appliance Developer Kit 0.x before 0.8.0, and s800i (Asterisk Appliance) 1.x before 1.0.3 allows remote attackers to cause a denial of service (memory exhaustion) via a SIP dialog that causes a large number of history entries to be created.
References
▼ | URL | Tags |
---|---|---|
http://securityreason.com/securityalert/3047 | third-party-advisory, x_refsource_SREASON | |
http://www.vupen.com/english/advisories/2007/2953 | vdb-entry, x_refsource_VUPEN | |
http://downloads.digium.com/pub/asa/AST-2007-020.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/25392 | vdb-entry, x_refsource_BID | |
http://seclists.org/fulldisclosure/2007/Aug/0393.html | mailing-list, x_refsource_FULLDISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/36145 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/26553 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id?1018595 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:53:55.958Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "3047", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3047" }, { "name": "ADV-2007-2953", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2953" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.digium.com/pub/asa/AST-2007-020.html" }, { "name": "25392", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25392" }, { "name": "20070821 AST-2007-020: Resource Exhaustion Vulnerability in Asterisk SIP channel driver", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2007/Aug/0393.html" }, { "name": "asterisk-sip-dialoghistory-dos(36145)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36145" }, { "name": "26553", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26553" }, { "name": "1018595", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018595" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-08-21T00:00:00", "descriptions": [ { "lang": "en", "value": "The SIP channel driver (chan_sip) in Asterisk Open Source 1.4.x before 1.4.11, AsteriskNOW before beta7, Asterisk Appliance Developer Kit 0.x before 0.8.0, and s800i (Asterisk Appliance) 1.x before 1.0.3 allows remote attackers to cause a denial of service (memory exhaustion) via a SIP dialog that causes a large number of history entries to be created." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "3047", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3047" }, { "name": "ADV-2007-2953", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2953" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.digium.com/pub/asa/AST-2007-020.html" }, { "name": "25392", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25392" }, { "name": "20070821 AST-2007-020: Resource Exhaustion Vulnerability in Asterisk SIP channel driver", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2007/Aug/0393.html" }, { "name": "asterisk-sip-dialoghistory-dos(36145)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36145" }, { "name": "26553", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26553" }, { "name": "1018595", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018595" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4455", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SIP channel driver (chan_sip) in Asterisk Open Source 1.4.x before 1.4.11, AsteriskNOW before beta7, Asterisk Appliance Developer Kit 0.x before 0.8.0, and s800i (Asterisk Appliance) 1.x before 1.0.3 allows remote attackers to cause a denial of service (memory exhaustion) via a SIP dialog that causes a large number of history entries to be created." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "3047", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3047" }, { "name": "ADV-2007-2953", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2953" }, { "name": "http://downloads.digium.com/pub/asa/AST-2007-020.html", "refsource": "CONFIRM", "url": "http://downloads.digium.com/pub/asa/AST-2007-020.html" }, { "name": "25392", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25392" }, { "name": "20070821 AST-2007-020: Resource Exhaustion Vulnerability in Asterisk SIP channel driver", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2007/Aug/0393.html" }, { "name": "asterisk-sip-dialoghistory-dos(36145)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36145" }, { "name": "26553", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26553" }, { "name": "1018595", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018595" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4455", "datePublished": "2007-08-22T01:00:00", "dateReserved": "2007-08-21T00:00:00", "dateUpdated": "2024-08-07T14:53:55.958Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-3762
Vulnerability from cvelistv5
Published
2007-07-18 17:00
Modified
2024-08-07 14:28
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in the IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to execute arbitrary code by sending a long (1) voice or (2) video RTP frame.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/35466 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/26099 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id?1018407 | vdb-entry, x_refsource_SECTRACK | |
http://security.gentoo.org/glsa/glsa-200802-11.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/29051 | third-party-advisory, x_refsource_SECUNIA | |
http://bugs.gentoo.org/show_bug.cgi?id=185713 | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2007/2563 | vdb-entry, x_refsource_VUPEN | |
http://www.debian.org/security/2007/dsa-1358 | vendor-advisory, x_refsource_DEBIAN | |
http://www.novell.com/linux/security/advisories/2007_15_sr.html | vendor-advisory, x_refsource_SUSE | |
http://ftp.digium.com/pub/asa/ASA-2007-014.pdf | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/24949 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:28:52.292Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "asterisk-iax2channeldriver-bo(35466)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35466" }, { "name": "26099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26099" }, { "name": "1018407", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018407" }, { "name": "GLSA-200802-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "name": "29051", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29051" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "name": "ADV-2007-2563", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "SUSE-SR:2007:015", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-014.pdf" }, { "name": "24949", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24949" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to execute arbitrary code by sending a long (1) voice or (2) video RTP frame." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "asterisk-iax2channeldriver-bo(35466)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35466" }, { "name": "26099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26099" }, { "name": "1018407", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018407" }, { "name": "GLSA-200802-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "name": "29051", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29051" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "name": "ADV-2007-2563", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "SUSE-SR:2007:015", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-014.pdf" }, { "name": "24949", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24949" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3762", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to execute arbitrary code by sending a long (1) voice or (2) video RTP frame." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "asterisk-iax2channeldriver-bo(35466)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35466" }, { "name": "26099", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26099" }, { "name": "1018407", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018407" }, { "name": "GLSA-200802-11", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "name": "29051", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29051" }, { "name": "http://bugs.gentoo.org/show_bug.cgi?id=185713", "refsource": "CONFIRM", "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "name": "ADV-2007-2563", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "name": "DSA-1358", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "SUSE-SR:2007:015", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" }, { "name": "http://ftp.digium.com/pub/asa/ASA-2007-014.pdf", "refsource": "CONFIRM", "url": "http://ftp.digium.com/pub/asa/ASA-2007-014.pdf" }, { "name": "24949", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24949" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3762", "datePublished": "2007-07-18T17:00:00", "dateReserved": "2007-07-13T00:00:00", "dateUpdated": "2024-08-07T14:28:52.292Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-3763
Vulnerability from cvelistv5
Published
2007-07-18 17:00
Modified
2024-08-07 14:28
Severity ?
EPSS score ?
Summary
The IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted (1) LAGRQ or (2) LAGRP frame that contains information elements of IAX frames, which results in a NULL pointer dereference when Asterisk does not properly set an associated variable.
References
▼ | URL | Tags |
---|---|---|
http://ftp.digium.com/pub/asa/ASA-2007-015.pdf | x_refsource_CONFIRM | |
http://secunia.com/advisories/26099 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/24950 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id?1018407 | vdb-entry, x_refsource_SECTRACK | |
http://security.gentoo.org/glsa/glsa-200802-11.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/29051 | third-party-advisory, x_refsource_SECUNIA | |
http://bugs.gentoo.org/show_bug.cgi?id=185713 | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2007/2563 | vdb-entry, x_refsource_VUPEN | |
http://www.debian.org/security/2007/dsa-1358 | vendor-advisory, x_refsource_DEBIAN | |
http://www.novell.com/linux/security/advisories/2007_15_sr.html | vendor-advisory, x_refsource_SUSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:28:52.493Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-015.pdf" }, { "name": "26099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26099" }, { "name": "24950", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24950" }, { "name": "1018407", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018407" }, { "name": "GLSA-200802-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "name": "29051", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29051" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "name": "ADV-2007-2563", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "SUSE-SR:2007:015", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted (1) LAGRQ or (2) LAGRP frame that contains information elements of IAX frames, which results in a NULL pointer dereference when Asterisk does not properly set an associated variable." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-07-27T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-015.pdf" }, { "name": "26099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26099" }, { "name": "24950", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24950" }, { "name": "1018407", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018407" }, { "name": "GLSA-200802-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "name": "29051", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29051" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "name": "ADV-2007-2563", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "SUSE-SR:2007:015", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3763", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted (1) LAGRQ or (2) LAGRP frame that contains information elements of IAX frames, which results in a NULL pointer dereference when Asterisk does not properly set an associated variable." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://ftp.digium.com/pub/asa/ASA-2007-015.pdf", "refsource": "CONFIRM", "url": "http://ftp.digium.com/pub/asa/ASA-2007-015.pdf" }, { "name": "26099", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26099" }, { "name": "24950", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24950" }, { "name": "1018407", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018407" }, { "name": "GLSA-200802-11", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "name": "29051", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29051" }, { "name": "http://bugs.gentoo.org/show_bug.cgi?id=185713", "refsource": "CONFIRM", "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "name": "ADV-2007-2563", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "name": "DSA-1358", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "SUSE-SR:2007:015", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3763", "datePublished": "2007-07-18T17:00:00", "dateReserved": "2007-07-13T00:00:00", "dateUpdated": "2024-08-07T14:28:52.493Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-3765
Vulnerability from cvelistv5
Published
2007-07-18 17:00
Modified
2024-08-07 14:28
Severity ?
EPSS score ?
Summary
The STUN implementation in Asterisk 1.4.x before 1.4.8, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted STUN length attribute in a STUN packet sent on an RTP port.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/26099 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/24950 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id?1018407 | vdb-entry, x_refsource_SECTRACK | |
http://ftp.digium.com/pub/asa/ASA-2007-017.pdf | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35480 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2007/2563 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:28:52.295Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "26099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26099" }, { "name": "24950", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24950" }, { "name": "1018407", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018407" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-017.pdf" }, { "name": "asterisk-stun-dos(35480)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35480" }, { "name": "ADV-2007-2563", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2563" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The STUN implementation in Asterisk 1.4.x before 1.4.8, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted STUN length attribute in a STUN packet sent on an RTP port." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "26099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26099" }, { "name": "24950", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24950" }, { "name": "1018407", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018407" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-017.pdf" }, { "name": "asterisk-stun-dos(35480)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35480" }, { "name": "ADV-2007-2563", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2563" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3765", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The STUN implementation in Asterisk 1.4.x before 1.4.8, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted STUN length attribute in a STUN packet sent on an RTP port." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "26099", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26099" }, { "name": "24950", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24950" }, { "name": "1018407", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018407" }, { "name": "http://ftp.digium.com/pub/asa/ASA-2007-017.pdf", "refsource": "CONFIRM", "url": "http://ftp.digium.com/pub/asa/ASA-2007-017.pdf" }, { "name": "asterisk-stun-dos(35480)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35480" }, { "name": "ADV-2007-2563", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2563" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3765", "datePublished": "2007-07-18T17:00:00", "dateReserved": "2007-07-13T00:00:00", "dateUpdated": "2024-08-07T14:28:52.295Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1923
Vulnerability from cvelistv5
Published
2008-04-23 16:00
Modified
2024-08-07 08:41
Severity ?
EPSS score ?
Summary
The IAX2 channel driver (chan_iax2) in Asterisk 1.2 before revision 72630 and 1.4 before revision 65679, when configured to allow unauthenticated calls, sends "early audio" to an unverified source IP address of a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed NEW message.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/42049 | vdb-entry, x_refsource_XF | |
http://downloads.digium.com/pub/security/AST-2008-006.html | x_refsource_CONFIRM | |
http://bugs.digium.com/view.php?id=10078 | x_refsource_CONFIRM | |
http://www.altsci.com/concepts/page.php?s=asteri&p=1 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:41:00.169Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "asterisk-new-dos(42049)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42049" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.digium.com/pub/security/AST-2008-006.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.digium.com/view.php?id=10078" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.altsci.com/concepts/page.php?s=asteri\u0026p=1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-04-22T00:00:00", "descriptions": [ { "lang": "en", "value": "The IAX2 channel driver (chan_iax2) in Asterisk 1.2 before revision 72630 and 1.4 before revision 65679, when configured to allow unauthenticated calls, sends \"early audio\" to an unverified source IP address of a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed NEW message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "asterisk-new-dos(42049)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42049" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.digium.com/pub/security/AST-2008-006.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.digium.com/view.php?id=10078" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.altsci.com/concepts/page.php?s=asteri\u0026p=1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1923", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The IAX2 channel driver (chan_iax2) in Asterisk 1.2 before revision 72630 and 1.4 before revision 65679, when configured to allow unauthenticated calls, sends \"early audio\" to an unverified source IP address of a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed NEW message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "asterisk-new-dos(42049)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42049" }, { "name": "http://downloads.digium.com/pub/security/AST-2008-006.html", "refsource": "CONFIRM", "url": "http://downloads.digium.com/pub/security/AST-2008-006.html" }, { "name": "http://bugs.digium.com/view.php?id=10078", "refsource": "CONFIRM", "url": "http://bugs.digium.com/view.php?id=10078" }, { "name": "http://www.altsci.com/concepts/page.php?s=asteri\u0026p=1", "refsource": "MISC", "url": "http://www.altsci.com/concepts/page.php?s=asteri\u0026p=1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1923", "datePublished": "2008-04-23T16:00:00", "dateReserved": "2008-04-23T00:00:00", "dateUpdated": "2024-08-07T08:41:00.169Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-3264
Vulnerability from cvelistv5
Published
2008-07-24 15:18
Modified
2024-08-07 09:28
Severity ?
EPSS score ?
Summary
The FWDOWNL firmware-download implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (traffic amplification) via an IAX2 FWDOWNL request.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1020536 | vdb-entry, x_refsource_SECTRACK | |
http://security.gentoo.org/glsa/glsa-200905-01.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/31194 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2008/2168/references | vdb-entry, x_refsource_VUPEN | |
http://downloads.digium.com/pub/security/AST-2008-011.html | x_refsource_CONFIRM | |
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html | vendor-advisory, x_refsource_FEDORA | |
http://secunia.com/advisories/31178 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/43955 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/30350 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/494676/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/34982 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:28:41.869Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1020536", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020536" }, { "name": "GLSA-200905-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200905-01.xml" }, { "name": "31194", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31194" }, { "name": "ADV-2008-2168", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2168/references" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.digium.com/pub/security/AST-2008-011.html" }, { "name": "FEDORA-2008-6676", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html" }, { "name": "31178", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31178" }, { "name": "asterisk-downloadprotocol-dos(43955)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43955" }, { "name": "30350", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/30350" }, { "name": "20080722 AST-2008-011: Traffic amplification in IAX2 firmware provisioning system", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/494676/100/0/threaded" }, { "name": "34982", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34982" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-07-18T00:00:00", "descriptions": [ { "lang": "en", "value": "The FWDOWNL firmware-download implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (traffic amplification) via an IAX2 FWDOWNL request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1020536", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020536" }, { "name": "GLSA-200905-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200905-01.xml" }, { "name": "31194", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31194" }, { "name": "ADV-2008-2168", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2168/references" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.digium.com/pub/security/AST-2008-011.html" }, { "name": "FEDORA-2008-6676", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html" }, { "name": "31178", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31178" }, { "name": "asterisk-downloadprotocol-dos(43955)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43955" }, { "name": "30350", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/30350" }, { "name": "20080722 AST-2008-011: Traffic amplification in IAX2 firmware provisioning system", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/494676/100/0/threaded" }, { "name": "34982", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34982" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-3264", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The FWDOWNL firmware-download implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (traffic amplification) via an IAX2 FWDOWNL request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1020536", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020536" }, { "name": "GLSA-200905-01", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200905-01.xml" }, { "name": "31194", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31194" }, { "name": "ADV-2008-2168", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2168/references" }, { "name": "http://downloads.digium.com/pub/security/AST-2008-011.html", "refsource": "CONFIRM", "url": "http://downloads.digium.com/pub/security/AST-2008-011.html" }, { "name": "FEDORA-2008-6676", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html" }, { "name": "31178", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31178" }, { "name": "asterisk-downloadprotocol-dos(43955)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43955" }, { "name": "30350", "refsource": "BID", "url": "http://www.securityfocus.com/bid/30350" }, { "name": "20080722 AST-2008-011: Traffic amplification in IAX2 firmware provisioning system", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/494676/100/0/threaded" }, { "name": "34982", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34982" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-3264", "datePublished": "2008-07-24T15:18:00", "dateReserved": "2008-07-22T00:00:00", "dateUpdated": "2024-08-07T09:28:41.869Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1897
Vulnerability from cvelistv5
Published
2008-04-23 00:00
Modified
2024-08-07 08:40
Severity ?
EPSS score ?
Summary
The IAX2 channel driver (chan_iax2) in Asterisk Open Source 1.0.x, 1.2.x before 1.2.28, and 1.4.x before 1.4.19.1; Business Edition A.x.x, B.x.x before B.2.5.2, and C.x.x before C.1.8.1; AsteriskNOW before 1.0.3; Appliance Developer Kit 0.x.x; and s800i before 1.1.0.3, when configured to allow unauthenticated calls, does not verify that an ACK response contains a call number matching the server's reply to a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed ACK response that does not complete a 3-way handshake. NOTE: this issue exists because of an incomplete fix for CVE-2008-1923.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:40:59.845Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-200905-01", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200905-01.xml" }, { "name": "29927", "tags": [ "third-party-advisory", "x_transferred" ], "url": "http://secunia.com/advisories/29927" }, { "name": "asterisk-iax2protocol-ack-dos(41966)", "tags": [ "vdb-entry", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41966" }, { "name": "28901", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28901" }, { "name": "30010", "tags": [ "third-party-advisory", "x_transferred" ], "url": "http://secunia.com/advisories/30010" }, { "name": "ADV-2008-1324", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1324" }, { "tags": [ "x_transferred" ], "url": "http://downloads.digium.com/pub/security/AST-2008-006.html" }, { "tags": [ "x_transferred" ], "url": "http://bugs.digium.com/view.php?id=10078" }, { "name": "FEDORA-2008-3390", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00600.html" }, { "name": "20080422 AST-2008-006 - 3-way handshake in IAX2 incomplete", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/491220/100/0/threaded" }, { "tags": [ "x_transferred" ], "url": "http://www.altsci.com/concepts/page.php?s=asteri\u0026p=2" }, { "name": "30042", "tags": [ "third-party-advisory", "x_transferred" ], "url": "http://secunia.com/advisories/30042" }, { "name": "DSA-1563", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1563" }, { "name": "34982", "tags": [ "third-party-advisory", "x_transferred" ], "url": "http://secunia.com/advisories/34982" }, { "name": "1019918", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019918" }, { "name": "FEDORA-2008-3365", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00581.html" }, { "tags": [ "x_transferred" ], "url": "https://downloads.asterisk.org/pub/security/AST-2008-006.html" }, { "tags": [ "x_transferred" ], "url": "https://github.com/xrg/asterisk-xrg/commit/51714a24347dc57f9a208a4a8af84115ef407b83" }, { "tags": [ "x_transferred" ], "url": "https://github.com/jcollie/asterisk/commit/a8b180875b037b8da26f6a3bcc8e5e98b8c904d2" }, { "tags": [ "x_transferred" ], "url": "https://github.com/xrg/asterisk-xrg/commit/10da3dab24e8ca08cf2c983f8d0206e383535b5a" }, { "tags": [ "x_transferred" ], "url": "https://github.com/jcollie/asterisk/commit/771b3d8749b34b6eea4e03a2e514380da9582f90" }, { "tags": [ "x_transferred" ], "url": "https://github.com/pruiz/asterisk/commit/e0ef9bd22810c6969a7f222eec04798f19a7e2d6" }, { "tags": [ "x_transferred" ], "url": "https://github.com/jcollie/asterisk/commit/60de4fbbdf3ede49f158e23a9e3b679f2e519c1e" }, { "tags": [ "x_transferred" ], "url": "https://github.com/mojolingo/asterisk/commit/20ac3662f137dbf7f42d5295590069a7d3b1166b" }, { "tags": [ "x_transferred" ], "url": "https://github.com/silentindark/asterisk-1/commit/fe8b7f31db687f8b9992864b82c93d22833019c7" }, { "tags": [ "x_transferred" ], "url": "https://github.com/kaoru6/asterisk/commit/1fe14f38dd43dc894d21f85762b51208ba5c8acb" }, { "tags": [ "x_transferred" ], "url": "https://github.com/lyx2014/Asterisk/commit/0670e43c30135044e25cca7f80e1833e2c128653" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-04-22T00:00:00", "descriptions": [ { "lang": "en", "value": "The IAX2 channel driver (chan_iax2) in Asterisk Open Source 1.0.x, 1.2.x before 1.2.28, and 1.4.x before 1.4.19.1; Business Edition A.x.x, B.x.x before B.2.5.2, and C.x.x before C.1.8.1; AsteriskNOW before 1.0.3; Appliance Developer Kit 0.x.x; and s800i before 1.1.0.3, when configured to allow unauthenticated calls, does not verify that an ACK response contains a call number matching the server\u0027s reply to a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed ACK response that does not complete a 3-way handshake. NOTE: this issue exists because of an incomplete fix for CVE-2008-1923." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-20T02:02:11.362982", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-200905-01", "tags": [ "vendor-advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200905-01.xml" }, { "name": "29927", "tags": [ "third-party-advisory" ], "url": "http://secunia.com/advisories/29927" }, { "name": "asterisk-iax2protocol-ack-dos(41966)", "tags": [ "vdb-entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41966" }, { "name": "28901", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/28901" }, { "name": "30010", "tags": [ "third-party-advisory" ], "url": "http://secunia.com/advisories/30010" }, { "name": "ADV-2008-1324", "tags": [ "vdb-entry" ], "url": "http://www.vupen.com/english/advisories/2008/1324" }, { "url": "http://downloads.digium.com/pub/security/AST-2008-006.html" }, { "url": "http://bugs.digium.com/view.php?id=10078" }, { "name": "FEDORA-2008-3390", "tags": [ "vendor-advisory" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00600.html" }, { "name": "20080422 AST-2008-006 - 3-way handshake in IAX2 incomplete", "tags": [ "mailing-list" ], "url": "http://www.securityfocus.com/archive/1/491220/100/0/threaded" }, { "url": "http://www.altsci.com/concepts/page.php?s=asteri\u0026p=2" }, { "name": "30042", "tags": [ "third-party-advisory" ], "url": "http://secunia.com/advisories/30042" }, { "name": "DSA-1563", "tags": [ "vendor-advisory" ], "url": "http://www.debian.org/security/2008/dsa-1563" }, { "name": "34982", "tags": [ "third-party-advisory" ], "url": "http://secunia.com/advisories/34982" }, { "name": "1019918", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id?1019918" }, { "name": "FEDORA-2008-3365", "tags": [ "vendor-advisory" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00581.html" }, { "url": "https://downloads.asterisk.org/pub/security/AST-2008-006.html" }, { "url": "https://github.com/xrg/asterisk-xrg/commit/51714a24347dc57f9a208a4a8af84115ef407b83" }, { "url": "https://github.com/jcollie/asterisk/commit/a8b180875b037b8da26f6a3bcc8e5e98b8c904d2" }, { "url": "https://github.com/xrg/asterisk-xrg/commit/10da3dab24e8ca08cf2c983f8d0206e383535b5a" }, { "url": "https://github.com/jcollie/asterisk/commit/771b3d8749b34b6eea4e03a2e514380da9582f90" }, { "url": "https://github.com/pruiz/asterisk/commit/e0ef9bd22810c6969a7f222eec04798f19a7e2d6" }, { "url": "https://github.com/jcollie/asterisk/commit/60de4fbbdf3ede49f158e23a9e3b679f2e519c1e" }, { "url": "https://github.com/mojolingo/asterisk/commit/20ac3662f137dbf7f42d5295590069a7d3b1166b" }, { "url": "https://github.com/silentindark/asterisk-1/commit/fe8b7f31db687f8b9992864b82c93d22833019c7" }, { "url": "https://github.com/kaoru6/asterisk/commit/1fe14f38dd43dc894d21f85762b51208ba5c8acb" }, { "url": "https://github.com/lyx2014/Asterisk/commit/0670e43c30135044e25cca7f80e1833e2c128653" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1897", "datePublished": "2008-04-23T00:00:00", "dateReserved": "2008-04-20T00:00:00", "dateUpdated": "2024-08-07T08:40:59.845Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }