fkie_cve-2008-1332
Vulnerability from fkie_nvd
Published
2008-03-20 00:44
Modified
2024-11-21 00:44
Severity ?
Summary
Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header.
References
cve@mitre.orghttp://downloads.digium.com/pub/security/AST-2008-003.htmlPatch
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html
cve@mitre.orghttp://secunia.com/advisories/29426Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/29456Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/29470Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/29782Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/29957Vendor Advisory
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200804-13.xml
cve@mitre.orghttp://securitytracker.com/id?1019629
cve@mitre.orghttp://www.asterisk.org/node/48466
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1525
cve@mitre.orghttp://www.securityfocus.com/archive/1/489818/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/28310
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/0928
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/41308
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html
af854a3a-2127-422b-91ae-364da2661108http://downloads.digium.com/pub/security/AST-2008-003.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29426Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29456Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29470Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29782Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29957Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200804-13.xml
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1019629
af854a3a-2127-422b-91ae-364da2661108http://www.asterisk.org/node/48466
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1525
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/489818/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28310
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0928
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/41308
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html
Impacted products
Vendor Product Version
asterisk asterisk a
asterisk asterisk b.1.3.2
asterisk asterisk b.1.3.3
asterisk asterisk b.2.2.0
asterisk asterisk b.2.2.1
asterisk asterisk b.2.3.1
asterisk asterisk b.2.3.2
asterisk asterisk b.2.3.3
asterisk asterisk b.2.3.4
asterisk asterisk b.2.3.5
asterisk asterisk b.2.3.6
asterisk asterisk c.1.0_beta7
asterisk asterisk c.1.0_beta8
asterisk asterisk c.1.6
asterisk asterisk c.1.6.1
asterisk asterisk_appliance_developer_kit *
asterisk asterisk_appliance_developer_kit 0.2
asterisk asterisk_appliance_developer_kit 0.3
asterisk asterisk_appliance_developer_kit 0.4
asterisk asterisk_appliance_developer_kit 0.5
asterisk asterisk_appliance_developer_kit 0.6
asterisk asterisk_appliance_developer_kit 0.6.0
asterisk asterisk_appliance_developer_kit 0.7
asterisk asterisk_appliance_developer_kit 0.8
asterisk asterisk_appliance_developer_kit 1.3
asterisk asterisk_business_edition *
asterisk asterisk_business_edition *
asterisk asterisk_business_edition *
asterisk asterisknow *
asterisk asterisknow 1.0
asterisk open_source *
asterisk open_source *
asterisk open_source *
asterisk open_source 1.0
asterisk open_source 1.0.0
asterisk open_source 1.0.1
asterisk open_source 1.0.2
asterisk open_source 1.0.3
asterisk open_source 1.0.3.4
asterisk open_source 1.0.4
asterisk open_source 1.0.5
asterisk open_source 1.0.6
asterisk open_source 1.0.7
asterisk open_source 1.0.8
asterisk open_source 1.0.9
asterisk open_source 1.0.11
asterisk open_source 1.0.11.1
asterisk open_source 1.0.12
asterisk open_source 1.2.0
asterisk open_source 1.2.0
asterisk open_source 1.2.0
asterisk open_source 1.2.0
asterisk open_source 1.2.0beta2
asterisk open_source 1.2.1
asterisk open_source 1.2.2
asterisk open_source 1.2.3
asterisk open_source 1.2.4
asterisk open_source 1.2.5
asterisk open_source 1.2.6
asterisk open_source 1.2.7
asterisk open_source 1.2.7.1
asterisk open_source 1.2.8
asterisk open_source 1.2.9
asterisk open_source 1.2.9.1
asterisk open_source 1.2.10
asterisk open_source 1.2.11
asterisk open_source 1.2.12
asterisk open_source 1.2.12.1
asterisk open_source 1.2.13
asterisk open_source 1.2.14
asterisk open_source 1.2.15
asterisk open_source 1.2.16
asterisk open_source 1.2.17
asterisk open_source 1.2.18
asterisk open_source 1.2.19
asterisk open_source 1.2.20
asterisk open_source 1.2.21
asterisk open_source 1.2.21.1
asterisk open_source 1.2.22
asterisk open_source 1.2.23
asterisk open_source 1.2.24
asterisk open_source 1.2.25
asterisk open_source 1.2.26.1
asterisk open_source 1.2.26.2
asterisk open_source 1.4.0
asterisk open_source 1.4.0
asterisk open_source 1.4.0
asterisk open_source 1.4.0
asterisk open_source 1.4.1
asterisk open_source 1.4.10
asterisk open_source 1.4.10.1
asterisk open_source 1.4.11
asterisk open_source 1.4.12
asterisk open_source 1.4.12.1
asterisk open_source 1.4.13
asterisk open_source 1.4.14
asterisk open_source 1.4.15
asterisk open_source 1.4.16
asterisk open_source 1.4.16.1
asterisk open_source 1.4.16.2
asterisk open_source 1.4.18
asterisk open_source 1.4.19
asterisk s800i *
asterisk s800i 1.0
asterisk s800i 1.0.1
asterisk s800i 1.0.2
asterisk s800i 1.0.3
asterisk s800i 1.0.3.3
asterisk s800i 1.1.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:a:*:business:*:*:*:*:*",
              "matchCriteriaId": "C6702046-43CF-4C84-9F76-24716C9F7D20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.2:*:business:*:*:*:*:*",
              "matchCriteriaId": "524CF00B-1B36-4C1F-80B4-28349891669B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.3:*:business:*:*:*:*:*",
              "matchCriteriaId": "2942FA48-42CE-4E67-A5BF-7852652EDE28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.2.0:*:business:*:*:*:*:*",
              "matchCriteriaId": "4160A834-9194-474C-819B-60627E470D13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.2.1:*:business:*:*:*:*:*",
              "matchCriteriaId": "D81F6E55-80F1-4770-9FF0-305EEEF3C4E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.1:*:business:*:*:*:*:*",
              "matchCriteriaId": "087DC9EC-0DF2-48AE-BB62-8DDF95C3EC56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.2:*:business:*:*:*:*:*",
              "matchCriteriaId": "471032A5-5EB6-44D1-91C8-BEA42C1E205A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.3:*:business:*:*:*:*:*",
              "matchCriteriaId": "6FEB3FCA-065E-4C32-A4C7-F2C79F214F17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.4:*:business:*:*:*:*:*",
              "matchCriteriaId": "636D765F-C47B-4762-9419-D7B51FA38AEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.5:*:business:*:*:*:*:*",
              "matchCriteriaId": "36F29EE8-E05F-4F0A-B0FA-66C551856C3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.6:*:business:*:*:*:*:*",
              "matchCriteriaId": "CEAA72FE-E13C-4363-AF5C-7D1CEEE2FA77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:c.1.0_beta7:*:business:*:*:*:*:*",
              "matchCriteriaId": "D0A87D63-35F5-47D7-893B-E8B179B16C3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:c.1.0_beta8:*:business:*:*:*:*:*",
              "matchCriteriaId": "95C1809E-9031-483F-B873-160284FA71D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:c.1.6:*:business:*:*:*:*:*",
              "matchCriteriaId": "E35C336A-A786-476B-8B9F-E682D999B6AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:c.1.6.1:*:business:*:*:*:*:*",
              "matchCriteriaId": "8121721B-EBC6-44EA-86D6-7B0FF1C8FF52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEF22BFB-2B22-4FBE-AE35-D7BC2A461865",
              "versionEndIncluding": "1.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C05B437-C292-4AA0-8AFE-1CA07CD80034",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0102C4C0-1A7D-4AB7-9817-44E6B0DB761E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "81DDF486-4185-48EE-869E-0AA6726C31F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF45A8E1-F6B1-42BD-9168-12062FA6EAEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5757B9B-2759-439A-9A6D-CCDD6C8C8940",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4548D39-0562-4946-AA51-A7C1A31AEE8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCD71268-EAA2-477B-8AC4-DE4853A262B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "529B2115-A191-4F3F-8F8C-A38B7C45463A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B76EFDCA-20EC-4C62-A0AD-CBD317D69441",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4EC98BF-00C0-48F5-ADFA-DB8AC6E95F3A",
              "versionEndIncluding": "a",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E140B81-4528-4BCC-AE60-B91DD4B2C9FE",
              "versionEndIncluding": "b.2.5.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E8CF6B9-050B-426B-86FC-8A32E8C09A68",
              "versionEndIncluding": "c.1.6.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisknow:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7C58E6B-AECC-48AF-8059-61772690776A",
              "versionEndIncluding": "1.0.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisknow:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC6FE17C-3B08-4675-9F73-5DC0C2438BB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A66DC4A6-290C-48ED-A0F8-8DC05EA0AAC6",
              "versionEndIncluding": "1.2.26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CEDD6A3-13B1-4553-8BAD-93DB5203F3B6",
              "versionEndIncluding": "1.4.17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:*:rc-2:*:*:*:*:*:*",
              "matchCriteriaId": "F4AB8D8F-15AC-4516-85A2-B5D2B5B3DF04",
              "versionEndIncluding": "1.4.19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "678DB154-4363-42FF-8B28-367923FC6595",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8F2C378-FF0E-4765-9F66-625C4064D5CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A55A9295-F632-4856-90A1-38371EB98589",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FAE6AF1-884D-41F7-B174-9E13C7719C99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCA9E35B-9A6B-42F2-9315-9C7D09F62227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "89B1F293-4F0F-48FD-A1F1-1230B94D87D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDF7EC20-A424-45E5-B7E4-3CC86075858C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C790E105-55C8-4CDC-9FA8-E1FF6F130A67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "44C860EF-2B29-4995-B942-000CC43FDD14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ADB80EF-C724-44BA-88FC-24087799D0C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "78B39BE8-7E2D-42DF-8633-44CAD5662777",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F39036E3-0027-4C72-9DEB-9A6E2B4512C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A037E6F9-3EF7-4EEB-AC16-081421BCE40D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A7EC02A-9C9E-4589-BBB3-1908D3078A7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C70FA9C-6F3B-4BDF-97FB-81D06AB0EE65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F7971E1-F136-4ADC-95EC-BC4F92E838CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "E62D108C-862D-4BDB-BE37-285AA4C9C59A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "CF1422F3-829D-498C-83A6-02989DFB70A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEB9D69-A404-4053-92F9-CAC3481AFF1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0beta2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7B2F43B-8B69-4BF6-86B7-A225175FF068",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "27202966-2C41-4964-9497-1887D2A834C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1471B5A2-15BE-4E7C-BA49-2E6002F7C8EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7108D72F-5AFD-4EEF-B2A9-CA4FA792E193",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "107DA2D8-FE7C-4B70-856D-43D58B988694",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD71DD9-8A15-45E2-9FB3-F0544D7E1B80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C14614F-4E27-40A6-9E56-2B1DBB10330B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A2F2F5A-66FD-4057-917C-66332A88D83E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "399B0206-B48B-46EF-8CA6-A6E5A2550B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "26E9760F-C0EB-47BB-8DA4-CC7815099DAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C510A9A-C3E2-4AF8-9919-1A22E918CDEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BD915CD-A7D3-4305-A6C0-290C648A226C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E79CCE5-C29B-4726-8D2F-BC20F70959BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "F29C13DB-6F04-4B41-90A2-2408D70F3641",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F4F734E-0E78-4957-B323-8E9FBA7FF15C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A4B117B-E945-4033-A79D-10DFAA3DF18B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA6D866F-8189-4FFD-AA24-47C0A015C246",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4EBFB79-C269-4132-BFAB-451F66CE8289",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9E1028E-2C07-4BA3-B891-FA853A87B280",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E74F577-70BD-4FAF-BCFD-10CD21FC5601",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "57BB03E2-E61C-4A94-82DF-8720698CE271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B30A36F-5CE6-4246-8752-176FB5999C1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0F76DFD-4DAC-4B02-8967-B242CDEEF6C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A59BC20-3217-4584-9196-D1CD9E0D6B52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "56F728BA-FC9E-4EEE-9A08-C9C7433BD8D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C64DF29-5B3D-401E-885E-8E37FD577254",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A7BF52A-2FF8-40ED-B757-28A1101DE8F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A321C2D-852B-4498-ADD6-79956410AB94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D5F0DCF-C6A2-4A09-90C9-D70F174FDEF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C820538E-14EC-43C1-80DB-6AAE4905EF0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A6D8FD0-C8C1-4868-9AF1-96B1949C18AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "72A840B4-216B-4063-997F-791FBC8C8658",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "967DF432-DEF4-4FA2-8C8D-19A7FB663A33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "40850BF4-E252-4667-9B46-9B6FEF6E997D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "1BB01DD1-B29B-4210-88CC-9ADB3148A410",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "5C0FA6A3-BFA9-4397-B75B-75C8357C36B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "295D4042-2D3C-481B-B969-2DDAC1161198",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "044FD0D0-FC92-4A01-B0D4-11A703EF21FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3477EC1A-9634-492C-B052-35770A9C9F4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C90F104-FA2C-4091-B149-1774AC982C0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9328768-7C08-4143-B5F8-F5C2D735D21A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C04E2B3-094B-4828-A2FC-BB66244A9F73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BDE3D31-4BB2-45A3-B085-8C91152A3152",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE0107D4-395E-45F1-B963-7618CCC007D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "53B8E11B-4984-45A8-A107-D276205988B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "2495DB98-F923-4E60-86EC-2DBB7A98C90C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E186D125-996E-4900-A2B8-5CDC8B5D5136",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "27DC6CF7-4DF8-4472-A684-8CCB5E26FCFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A838577-2BA1-4792-8B69-6FB07FFD7727",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "C4FF0F09-0268-480F-A2F3-6F8C3F323EEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:s800i:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D1E04DC-AE6A-4536-8E45-36494E51B036",
              "versionEndIncluding": "1.1.0.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:s800i:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C3A0A08-4107-4B8B-AE7E-DC23849A54DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:s800i:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9320928D-D83C-4258-AF62-AB2D1F50D972",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:s800i:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "569084D1-977D-41FC-A444-0B3F5199DDD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:s800i:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D182FB-761C-4F08-A776-B613FAC55230",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:s800i:1.0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9046D49-6878-4571-8B9E-2FBD5BA80D19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:s800i:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7B5EDAB-61DD-4864-A159-39292D339DA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en Asterisk Open Source versiones 1.2.x anteriores a 1.2.27, 1.4.x anteriores a 1.4.18.1 y 1.4.19-rc3; en Business Edition versiones A.x.x, B.x.x anteriores a B.2.5.1, y C.x.x anteriores a C.1.6.2; en AsteriskNOW versiones 1.0.x anteriores a 1.0.2; Appliance Developer Kit anteriores a 1.4 revisi\u00f3n 109393; y s800i versiones 1.0.x anteriores a 1.1.0.2 permite a atacantes remotos acceder al controlador del canal SIP mediante la utilizaci\u00f3n de una cabecera From especialmente construida."
    }
  ],
  "id": "CVE-2008-1332",
  "lastModified": "2024-11-21T00:44:17.453",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 8.8,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 9.2,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-03-20T00:44:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://downloads.digium.com/pub/security/AST-2008-003.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29426"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29456"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29470"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29782"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29957"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200804-13.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1019629"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.asterisk.org/node/48466"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2008/dsa-1525"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/489818/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/28310"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/0928"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41308"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://downloads.digium.com/pub/security/AST-2008-003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29426"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29456"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29470"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29782"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29957"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200804-13.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1019629"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.asterisk.org/node/48466"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1525"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/489818/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28310"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0928"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41308"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.