All the vulnerabilites related to asterisk - asterisk
cve-2007-3763
Vulnerability from cvelistv5
Published
2007-07-18 17:00
Modified
2024-08-07 14:28
Severity ?
EPSS score ?
Summary
The IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted (1) LAGRQ or (2) LAGRP frame that contains information elements of IAX frames, which results in a NULL pointer dereference when Asterisk does not properly set an associated variable.
References
▼ | URL | Tags |
---|---|---|
http://ftp.digium.com/pub/asa/ASA-2007-015.pdf | x_refsource_CONFIRM | |
http://secunia.com/advisories/26099 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/24950 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id?1018407 | vdb-entry, x_refsource_SECTRACK | |
http://security.gentoo.org/glsa/glsa-200802-11.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/29051 | third-party-advisory, x_refsource_SECUNIA | |
http://bugs.gentoo.org/show_bug.cgi?id=185713 | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2007/2563 | vdb-entry, x_refsource_VUPEN | |
http://www.debian.org/security/2007/dsa-1358 | vendor-advisory, x_refsource_DEBIAN | |
http://www.novell.com/linux/security/advisories/2007_15_sr.html | vendor-advisory, x_refsource_SUSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:28:52.493Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-015.pdf" }, { "name": "26099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26099" }, { "name": "24950", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24950" }, { "name": "1018407", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018407" }, { "name": "GLSA-200802-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "name": "29051", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29051" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "name": "ADV-2007-2563", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "SUSE-SR:2007:015", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted (1) LAGRQ or (2) LAGRP frame that contains information elements of IAX frames, which results in a NULL pointer dereference when Asterisk does not properly set an associated variable." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-07-27T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-015.pdf" }, { "name": "26099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26099" }, { "name": "24950", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24950" }, { "name": "1018407", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018407" }, { "name": "GLSA-200802-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "name": "29051", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29051" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "name": "ADV-2007-2563", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "SUSE-SR:2007:015", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3763", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted (1) LAGRQ or (2) LAGRP frame that contains information elements of IAX frames, which results in a NULL pointer dereference when Asterisk does not properly set an associated variable." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://ftp.digium.com/pub/asa/ASA-2007-015.pdf", "refsource": "CONFIRM", "url": "http://ftp.digium.com/pub/asa/ASA-2007-015.pdf" }, { "name": "26099", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26099" }, { "name": "24950", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24950" }, { "name": "1018407", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018407" }, { "name": "GLSA-200802-11", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "name": "29051", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29051" }, { "name": "http://bugs.gentoo.org/show_bug.cgi?id=185713", "refsource": "CONFIRM", "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "name": "ADV-2007-2563", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "name": "DSA-1358", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "SUSE-SR:2007:015", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3763", "datePublished": "2007-07-18T17:00:00", "dateReserved": "2007-07-13T00:00:00", "dateUpdated": "2024-08-07T14:28:52.493Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-4521
Vulnerability from cvelistv5
Published
2007-08-28 01:00
Modified
2024-08-07 15:01
Severity ?
EPSS score ?
Summary
Asterisk Open Source 1.4.5 through 1.4.11, when configured to use an IMAP voicemail storage backend, allows remote attackers to cause a denial of service via an e-mail with an "invalid/corrupted" MIME body, which triggers a crash when the recipient listens to voicemail.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/26601 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id?1018606 | vdb-entry, x_refsource_SECTRACK | |
http://downloads.digium.com/pub/asa/AST-2007-021.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/477729/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/26602 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/36261 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2007/2978 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/25438 | vdb-entry, x_refsource_BID | |
http://securityreason.com/securityalert/3065 | third-party-advisory, x_refsource_SREASON |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:01:09.606Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "26601", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26601" }, { "name": "1018606", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018606" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.digium.com/pub/asa/AST-2007-021.html" }, { "name": "20070824 AST-2007-021: Crash from invalid/corrupted MIME bodies when using voicemail with IMAP storage", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/477729/100/0/threaded" }, { "name": "26602", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26602" }, { "name": "asterisk-mime-body-dos(36261)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36261" }, { "name": "ADV-2007-2978", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2978" }, { "name": "25438", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25438" }, { "name": "3065", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3065" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Asterisk Open Source 1.4.5 through 1.4.11, when configured to use an IMAP voicemail storage backend, allows remote attackers to cause a denial of service via an e-mail with an \"invalid/corrupted\" MIME body, which triggers a crash when the recipient listens to voicemail." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "26601", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26601" }, { "name": "1018606", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018606" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.digium.com/pub/asa/AST-2007-021.html" }, { "name": "20070824 AST-2007-021: Crash from invalid/corrupted MIME bodies when using voicemail with IMAP storage", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/477729/100/0/threaded" }, { "name": "26602", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26602" }, { "name": "asterisk-mime-body-dos(36261)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36261" }, { "name": "ADV-2007-2978", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2978" }, { "name": "25438", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25438" }, { "name": "3065", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3065" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4521", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Asterisk Open Source 1.4.5 through 1.4.11, when configured to use an IMAP voicemail storage backend, allows remote attackers to cause a denial of service via an e-mail with an \"invalid/corrupted\" MIME body, which triggers a crash when the recipient listens to voicemail." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "26601", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26601" }, { "name": "1018606", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018606" }, { "name": "http://downloads.digium.com/pub/asa/AST-2007-021.html", "refsource": "CONFIRM", "url": "http://downloads.digium.com/pub/asa/AST-2007-021.html" }, { "name": "20070824 AST-2007-021: Crash from invalid/corrupted MIME bodies when using voicemail with IMAP storage", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/477729/100/0/threaded" }, { "name": "26602", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26602" }, { "name": "asterisk-mime-body-dos(36261)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36261" }, { "name": "ADV-2007-2978", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2978" }, { "name": "25438", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25438" }, { "name": "3065", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3065" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4521", "datePublished": "2007-08-28T01:00:00", "dateReserved": "2007-08-24T00:00:00", "dateUpdated": "2024-08-07T15:01:09.606Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-2294
Vulnerability from cvelistv5
Published
2007-04-26 20:00
Modified
2024-08-07 13:33
Severity ?
EPSS score ?
Summary
The Manager Interface in Asterisk before 1.2.18 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (crash) by using MD5 authentication to authenticate a user that does not have a password defined in manager.conf, resulting in a NULL pointer dereference.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2007/1534 | vdb-entry, x_refsource_VUPEN | |
http://www.securitytracker.com/id?1017955 | vdb-entry, x_refsource_SECTRACK | |
http://www.novell.com/linux/security/advisories/2007_34_asterisk.html | vendor-advisory, x_refsource_SUSE | |
http://www.osvdb.org/35369 | vdb-entry, x_refsource_OSVDB | |
http://securityreason.com/securityalert/2646 | third-party-advisory, x_refsource_SREASON | |
http://secunia.com/advisories/25582 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/33886 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/24977 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/23649 | vdb-entry, x_refsource_BID | |
http://www.debian.org/security/2007/dsa-1358 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/archive/1/466911/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.asterisk.org/files/ASA-2007-012.pdf | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:33:28.299Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2007-1534", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1534" }, { "name": "1017955", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1017955" }, { "name": "SUSE-SA:2007:034", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "35369", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/35369" }, { "name": "2646", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2646" }, { "name": "25582", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25582" }, { "name": "asterisk-interface-dos(33886)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33886" }, { "name": "24977", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24977" }, { "name": "23649", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/23649" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "20070425 ASA-2007-012: Remote Crash Vulnerability in Manager Interface", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/466911/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.asterisk.org/files/ASA-2007-012.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-04-25T00:00:00", "descriptions": [ { "lang": "en", "value": "The Manager Interface in Asterisk before 1.2.18 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (crash) by using MD5 authentication to authenticate a user that does not have a password defined in manager.conf, resulting in a NULL pointer dereference." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2007-1534", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1534" }, { "name": "1017955", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1017955" }, { "name": "SUSE-SA:2007:034", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "35369", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/35369" }, { "name": "2646", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2646" }, { "name": "25582", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25582" }, { "name": "asterisk-interface-dos(33886)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33886" }, { "name": "24977", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24977" }, { "name": "23649", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/23649" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "20070425 ASA-2007-012: Remote Crash Vulnerability in Manager Interface", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/466911/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.asterisk.org/files/ASA-2007-012.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-2294", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Manager Interface in Asterisk before 1.2.18 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (crash) by using MD5 authentication to authenticate a user that does not have a password defined in manager.conf, resulting in a NULL pointer dereference." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2007-1534", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1534" }, { "name": "1017955", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1017955" }, { "name": "SUSE-SA:2007:034", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "35369", "refsource": "OSVDB", "url": "http://www.osvdb.org/35369" }, { "name": "2646", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2646" }, { "name": "25582", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25582" }, { "name": "asterisk-interface-dos(33886)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33886" }, { "name": "24977", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24977" }, { "name": "23649", "refsource": "BID", "url": "http://www.securityfocus.com/bid/23649" }, { "name": "DSA-1358", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "20070425 ASA-2007-012: Remote Crash Vulnerability in Manager Interface", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/466911/100/0/threaded" }, { "name": "http://www.asterisk.org/files/ASA-2007-012.pdf", "refsource": "CONFIRM", "url": "http://www.asterisk.org/files/ASA-2007-012.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-2294", "datePublished": "2007-04-26T20:00:00", "dateReserved": "2007-04-26T00:00:00", "dateUpdated": "2024-08-07T13:33:28.299Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1332
Vulnerability from cvelistv5
Published
2008-03-20 00:00
Modified
2024-08-07 08:17
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:17:34.472Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SUSE-SR:2008:010", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html" }, { "name": "29782", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29782" }, { "name": "GLSA-200804-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200804-13.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.digium.com/pub/security/AST-2008-003.html" }, { "name": "28310", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28310" }, { "name": "20080318 AST-2008-003: Unauthenticated calls allowed from SIP channel driver", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/489818/100/0/threaded" }, { "name": "DSA-1525", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1525" }, { "name": "29426", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29426" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.asterisk.org/node/48466" }, { "name": "FEDORA-2008-2554", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html" }, { "name": "1019629", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1019629" }, { "name": "asterisk-sip-security-bypass(41308)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41308" }, { "name": "ADV-2008-0928", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0928" }, { "name": "FEDORA-2008-2620", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html" }, { "name": "29957", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29957" }, { "name": "29456", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29456" }, { "name": "29470", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29470" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "SUSE-SR:2008:010", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html" }, { "name": "29782", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29782" }, { "name": "GLSA-200804-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200804-13.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.digium.com/pub/security/AST-2008-003.html" }, { "name": "28310", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28310" }, { "name": "20080318 AST-2008-003: Unauthenticated calls allowed from SIP channel driver", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/489818/100/0/threaded" }, { "name": "DSA-1525", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1525" }, { "name": "29426", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29426" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.asterisk.org/node/48466" }, { "name": "FEDORA-2008-2554", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html" }, { "name": "1019629", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1019629" }, { "name": "asterisk-sip-security-bypass(41308)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41308" }, { "name": "ADV-2008-0928", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0928" }, { "name": "FEDORA-2008-2620", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html" }, { "name": "29957", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29957" }, { "name": "29456", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29456" }, { "name": "29470", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29470" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1332", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SUSE-SR:2008:010", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html" }, { "name": "29782", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29782" }, { "name": "GLSA-200804-13", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200804-13.xml" }, { "name": "http://downloads.digium.com/pub/security/AST-2008-003.html", "refsource": "CONFIRM", "url": "http://downloads.digium.com/pub/security/AST-2008-003.html" }, { "name": "28310", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28310" }, { "name": "20080318 AST-2008-003: Unauthenticated calls allowed from SIP channel driver", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/489818/100/0/threaded" }, { "name": "DSA-1525", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1525" }, { "name": "29426", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29426" }, { "name": "http://www.asterisk.org/node/48466", "refsource": "CONFIRM", "url": "http://www.asterisk.org/node/48466" }, { "name": "FEDORA-2008-2554", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html" }, { "name": "1019629", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1019629" }, { "name": "asterisk-sip-security-bypass(41308)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41308" }, { "name": "ADV-2008-0928", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0928" }, { "name": "FEDORA-2008-2620", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html" }, { "name": "29957", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29957" }, { "name": "29456", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29456" }, { "name": "29470", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29470" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1332", "datePublished": "2008-03-20T00:00:00", "dateReserved": "2008-03-13T00:00:00", "dateUpdated": "2024-08-07T08:17:34.472Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-2293
Vulnerability from cvelistv5
Published
2007-04-26 20:00
Modified
2024-08-07 13:33
Severity ?
EPSS score ?
Summary
Multiple stack-based buffer overflows in the process_sdp function in chan_sip.c of the SIP channel T.38 SDP parser in Asterisk before 1.4.3 allow remote attackers to execute arbitrary code via a long (1) T38FaxRateManagement or (2) T38FaxUdpEC SDP parameter in an SIP message, as demonstrated using SIP INVITE.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/23648 | vdb-entry, x_refsource_BID | |
http://www.osvdb.org/35368 | vdb-entry, x_refsource_OSVDB | |
http://www.vupen.com/english/advisories/2007/1534 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/archive/1/466883/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/archive/1/472804/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/33895 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/24977 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id?1018337 | vdb-entry, x_refsource_SECTRACK | |
http://www.securitytracker.com/id?1017951 | vdb-entry, x_refsource_SECTRACK | |
http://securityreason.com/securityalert/2645 | third-party-advisory, x_refsource_SREASON | |
http://www.asterisk.org/files/ASA-2007-010.pdf | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:33:28.390Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "23648", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/23648" }, { "name": "35368", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/35368" }, { "name": "ADV-2007-1534", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1534" }, { "name": "20070425 ASA-2007-010: Two stack buffer overflows in SIP channel\u0027s T.38 SDP parsing code", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/466883/100/0/threaded" }, { "name": "20070704 Multiple Remote unauthenticated stack overflows in Asterisk chan_sip.c", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/472804/100/0/threaded" }, { "name": "asterisk-processsdp-bo(33895)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33895" }, { "name": "24977", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24977" }, { "name": "1018337", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018337" }, { "name": "1017951", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1017951" }, { "name": "2645", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2645" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.asterisk.org/files/ASA-2007-010.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-04-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in the process_sdp function in chan_sip.c of the SIP channel T.38 SDP parser in Asterisk before 1.4.3 allow remote attackers to execute arbitrary code via a long (1) T38FaxRateManagement or (2) T38FaxUdpEC SDP parameter in an SIP message, as demonstrated using SIP INVITE." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "23648", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/23648" }, { "name": "35368", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/35368" }, { "name": "ADV-2007-1534", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1534" }, { "name": "20070425 ASA-2007-010: Two stack buffer overflows in SIP channel\u0027s T.38 SDP parsing code", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/466883/100/0/threaded" }, { "name": "20070704 Multiple Remote unauthenticated stack overflows in Asterisk chan_sip.c", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/472804/100/0/threaded" }, { "name": "asterisk-processsdp-bo(33895)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33895" }, { "name": "24977", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24977" }, { "name": "1018337", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018337" }, { "name": "1017951", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1017951" }, { "name": "2645", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2645" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.asterisk.org/files/ASA-2007-010.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-2293", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple stack-based buffer overflows in the process_sdp function in chan_sip.c of the SIP channel T.38 SDP parser in Asterisk before 1.4.3 allow remote attackers to execute arbitrary code via a long (1) T38FaxRateManagement or (2) T38FaxUdpEC SDP parameter in an SIP message, as demonstrated using SIP INVITE." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "23648", "refsource": "BID", "url": "http://www.securityfocus.com/bid/23648" }, { "name": "35368", "refsource": "OSVDB", "url": "http://www.osvdb.org/35368" }, { "name": "ADV-2007-1534", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1534" }, { "name": "20070425 ASA-2007-010: Two stack buffer overflows in SIP channel\u0027s T.38 SDP parsing code", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/466883/100/0/threaded" }, { "name": "20070704 Multiple Remote unauthenticated stack overflows in Asterisk chan_sip.c", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/472804/100/0/threaded" }, { "name": "asterisk-processsdp-bo(33895)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33895" }, { "name": "24977", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24977" }, { "name": "1018337", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018337" }, { "name": "1017951", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1017951" }, { "name": "2645", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2645" }, { "name": "http://www.asterisk.org/files/ASA-2007-010.pdf", "refsource": "CONFIRM", "url": "http://www.asterisk.org/files/ASA-2007-010.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-2293", "datePublished": "2007-04-26T20:00:00", "dateReserved": "2007-04-26T00:00:00", "dateUpdated": "2024-08-07T13:33:28.390Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42365
Vulnerability from cvelistv5
Published
2024-08-08 16:29
Modified
2024-08-12 15:49
Severity ?
EPSS score ?
Summary
Asterisk allows `Write=originate` as sufficient permissions for code execution / `System()` dialplan
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:asterisk:certified_asterisk:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "certified_asterisk", "vendor": "asterisk", "versions": [ { "lessThan": "18.9-cert11", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "20.7-cert2", "status": "affected", "version": "19.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:asterisk:asterisk:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "asterisk", "vendor": "asterisk", "versions": [ { "lessThan": "18.24.2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "20.9.2", "status": "affected", "version": "19.0.0", "versionType": "custom" }, { "lessThan": "21.4.2", "status": "affected", "version": "21.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-42365", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T16:38:45.608389Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-12T15:49:00.190Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "asterisk", "vendor": "asterisk", "versions": [ { "status": "affected", "version": "\u003c 18.24.2" }, { "status": "affected", "version": "\u003e= 19.0.0, \u003c 20.9.2" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.4.2" }, { "status": "affected", "version": "\u003c 18.9-cert11" }, { "status": "affected", "version": "\u003e= 19.0, \u003c 20.7-cert2" } ] } ], "descriptions": [ { "lang": "en", "value": "Asterisk is an open source private branch exchange (PBX) and telephony toolkit. Prior to asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2, an AMI user with `write=originate` may change all configuration files in the `/etc/asterisk/` directory. This occurs because they are able to curl remote files and write them to disk, but are also able to append to existing files using the `FILE` function inside the `SET` application. This issue may result in privilege escalation, remote code execution and/or blind server-side request forgery with arbitrary protocol. Asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2 contain a fix for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-267", "description": "CWE-267: Privilege Defined With Unsafe Actions", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-1220", "description": "CWE-1220: Insufficient Granularity of Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T16:29:07.436Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-c4cg-9275-6w44", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-c4cg-9275-6w44" }, { "name": "https://github.com/asterisk/asterisk/commit/42a2f4ccfa2c7062a15063e765916b3332e34cc4", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/commit/42a2f4ccfa2c7062a15063e765916b3332e34cc4" }, { "name": "https://github.com/asterisk/asterisk/commit/7a0090325bfa9d778a39ae5f7d0a98109e4651c8", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/commit/7a0090325bfa9d778a39ae5f7d0a98109e4651c8" }, { "name": "https://github.com/asterisk/asterisk/commit/b4063bf756272254b160b6d1bd6e9a3f8e16cc71", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/commit/b4063bf756272254b160b6d1bd6e9a3f8e16cc71" }, { "name": "https://github.com/asterisk/asterisk/commit/bbe68db10ab8a80c29db383e4dfe14f6eafaf993", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/commit/bbe68db10ab8a80c29db383e4dfe14f6eafaf993" }, { "name": "https://github.com/asterisk/asterisk/commit/faddd99f2b9408b524e5eb8a01589fe1fa282df2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/commit/faddd99f2b9408b524e5eb8a01589fe1fa282df2" }, { "name": "https://github.com/asterisk/asterisk/blob/14367caaf7241df1eceea7c45c5b261989c2c6db/main/manager.c#L6426", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/blob/14367caaf7241df1eceea7c45c5b261989c2c6db/main/manager.c#L6426" }, { "name": "https://github.com/asterisk/asterisk/blob/7d28165cb1b2d02d66e8693bd3fe23ee72fc55d8/main/manager.c#L6426", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/blob/7d28165cb1b2d02d66e8693bd3fe23ee72fc55d8/main/manager.c#L6426" } ], "source": { "advisory": "GHSA-c4cg-9275-6w44", "discovery": "UNKNOWN" }, "title": "Asterisk allows `Write=originate` as sufficient permissions for code execution / `System()` dialplan" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-42365", "datePublished": "2024-08-08T16:29:07.436Z", "dateReserved": "2024-07-30T14:01:33.923Z", "dateUpdated": "2024-08-12T15:49:00.190Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49294
Vulnerability from cvelistv5
Published
2023-12-14 19:40
Modified
2024-08-02 21:53
Severity ?
EPSS score ?
Summary
Asterisk Path Traversal vulnerability
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:45.375Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-8857-hfmw-vg8f", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-8857-hfmw-vg8f" }, { "name": "https://github.com/asterisk/asterisk/commit/424be345639d75c6cb7d0bd2da5f0f407dbd0bd5", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/asterisk/asterisk/commit/424be345639d75c6cb7d0bd2da5f0f407dbd0bd5" }, { "name": "https://github.com/asterisk/asterisk/blob/master/main/manager.c#L3757", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/asterisk/asterisk/blob/master/main/manager.c#L3757" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "asterisk", "vendor": "asterisk", "versions": [ { "status": "affected", "version": "\u003c 18.20.1" }, { "status": "affected", "version": "\u003e= 19.0.0, \u003c 20.5.1" }, { "status": "affected", "version": "= 21.0.0" }, { "status": "affected", "version": "\u003c 18.9-cert6" } ] } ], "descriptions": [ { "lang": "en", "value": "Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk prior to 18.9-cert6, it is possible to read any arbitrary file even when the `live_dangerously` is not enabled. This allows arbitrary files to be read. Asterisk versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk prior to 18.9-cert6, contain a fix for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-14T19:40:46.157Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-8857-hfmw-vg8f", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-8857-hfmw-vg8f" }, { "name": "https://github.com/asterisk/asterisk/commit/424be345639d75c6cb7d0bd2da5f0f407dbd0bd5", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/commit/424be345639d75c6cb7d0bd2da5f0f407dbd0bd5" }, { "name": "https://github.com/asterisk/asterisk/blob/master/main/manager.c#L3757", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/blob/master/main/manager.c#L3757" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html" } ], "source": { "advisory": "GHSA-8857-hfmw-vg8f", "discovery": "UNKNOWN" }, "title": "Asterisk Path Traversal vulnerability" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-49294", "datePublished": "2023-12-14T19:40:46.157Z", "dateReserved": "2023-11-24T16:45:24.314Z", "dateUpdated": "2024-08-02T21:53:45.375Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-1594
Vulnerability from cvelistv5
Published
2007-03-22 23:00
Modified
2024-08-07 12:59
Severity ?
EPSS score ?
Summary
The handle_response function in chan_sip.c in Asterisk before 1.2.17 and 1.4.x before 1.4.2 allows remote attackers to cause a denial of service (crash) via a SIP Response code 0 in a SIP packet.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:59:08.987Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://svn.digium.com/view/asterisk/trunk/channels/chan_sip.c?r1=58907\u0026r2=59038" }, { "name": "23093", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/23093" }, { "name": "ADV-2007-1077", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1077" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.digium.com/view.php?id=9313" }, { "name": "1017809", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1017809" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.asterisk.org/node/48338" }, { "name": "SUSE-SA:2007:034", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "20070321 Two new DoS Vulnerabilities in Asterisk Fixed", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/463434/100/0/threaded" }, { "name": "24579", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24579" }, { "name": "GLSA-200704-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200704-01.xml" }, { "name": "25582", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25582" }, { "name": "24719", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24719" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sineapps.com/news.php?rssid=1707" }, { "name": "[VOIPSEC] 20070319 Asterisk SDP DOS vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-03-19T00:00:00", "descriptions": [ { "lang": "en", "value": "The handle_response function in chan_sip.c in Asterisk before 1.2.17 and 1.4.x before 1.4.2 allows remote attackers to cause a denial of service (crash) via a SIP Response code 0 in a SIP packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://svn.digium.com/view/asterisk/trunk/channels/chan_sip.c?r1=58907\u0026r2=59038" }, { "name": "23093", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/23093" }, { "name": "ADV-2007-1077", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1077" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.digium.com/view.php?id=9313" }, { "name": "1017809", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1017809" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.asterisk.org/node/48338" }, { "name": "SUSE-SA:2007:034", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "20070321 Two new DoS Vulnerabilities in Asterisk Fixed", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/463434/100/0/threaded" }, { "name": "24579", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24579" }, { "name": "GLSA-200704-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200704-01.xml" }, { "name": "25582", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25582" }, { "name": "24719", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24719" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sineapps.com/news.php?rssid=1707" }, { "name": "[VOIPSEC] 20070319 Asterisk SDP DOS vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-1594", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The handle_response function in chan_sip.c in Asterisk before 1.2.17 and 1.4.x before 1.4.2 allows remote attackers to cause a denial of service (crash) via a SIP Response code 0 in a SIP packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://svn.digium.com/view/asterisk/trunk/channels/chan_sip.c?r1=58907\u0026r2=59038", "refsource": "MISC", "url": "http://svn.digium.com/view/asterisk/trunk/channels/chan_sip.c?r1=58907\u0026r2=59038" }, { "name": "23093", "refsource": "BID", "url": "http://www.securityfocus.com/bid/23093" }, { "name": "ADV-2007-1077", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1077" }, { "name": "http://bugs.digium.com/view.php?id=9313", "refsource": "MISC", "url": "http://bugs.digium.com/view.php?id=9313" }, { "name": "1017809", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1017809" }, { "name": "http://www.asterisk.org/node/48338", "refsource": "CONFIRM", "url": "http://www.asterisk.org/node/48338" }, { "name": "SUSE-SA:2007:034", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "20070321 Two new DoS Vulnerabilities in Asterisk Fixed", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/463434/100/0/threaded" }, { "name": "24579", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24579" }, { "name": "GLSA-200704-01", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200704-01.xml" }, { "name": "25582", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25582" }, { "name": "24719", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24719" }, { "name": "http://www.sineapps.com/news.php?rssid=1707", "refsource": "CONFIRM", "url": "http://www.sineapps.com/news.php?rssid=1707" }, { "name": "[VOIPSEC] 20070319 Asterisk SDP DOS vulnerability", "refsource": "MLIST", "url": "http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-1594", "datePublished": "2007-03-22T23:00:00", "dateReserved": "2007-03-22T00:00:00", "dateUpdated": "2024-08-07T12:59:08.987Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-3263
Vulnerability from cvelistv5
Published
2008-07-22 23:00
Modified
2024-08-07 09:28
Severity ?
EPSS score ?
Summary
The IAX2 protocol implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (call-number exhaustion and CPU consumption) by quickly sending a large number of IAX2 (IAX) POKE requests.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:28:41.740Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-200905-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200905-01.xml" }, { "name": "30321", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/30321" }, { "name": "31194", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31194" }, { "name": "asterisk-poke-dos(43942)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43942" }, { "name": "ADV-2008-2168", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2168/references" }, { "name": "FEDORA-2008-6676", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html" }, { "name": "31178", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31178" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://downloads.securityfocus.com/vulnerabilities/exploits/30321.pl" }, { "name": "20080722 AST-2008-010: Asterisk IAX \u0027POKE\u0027 resource exhaustion", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/494675/100/0/threaded" }, { "name": "1020535", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020535" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.digium.com/pub/security/AST-2008-010.html" }, { "name": "34982", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34982" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-07-21T00:00:00", "descriptions": [ { "lang": "en", "value": "The IAX2 protocol implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (call-number exhaustion and CPU consumption) by quickly sending a large number of IAX2 (IAX) POKE requests." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-200905-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200905-01.xml" }, { "name": "30321", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/30321" }, { "name": "31194", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31194" }, { "name": "asterisk-poke-dos(43942)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43942" }, { "name": "ADV-2008-2168", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2168/references" }, { "name": "FEDORA-2008-6676", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html" }, { "name": "31178", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31178" }, { "tags": [ "x_refsource_MISC" ], "url": "http://downloads.securityfocus.com/vulnerabilities/exploits/30321.pl" }, { "name": "20080722 AST-2008-010: Asterisk IAX \u0027POKE\u0027 resource exhaustion", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/494675/100/0/threaded" }, { "name": "1020535", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020535" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.digium.com/pub/security/AST-2008-010.html" }, { "name": "34982", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34982" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-3263", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The IAX2 protocol implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (call-number exhaustion and CPU consumption) by quickly sending a large number of IAX2 (IAX) POKE requests." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-200905-01", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200905-01.xml" }, { "name": "30321", "refsource": "BID", "url": "http://www.securityfocus.com/bid/30321" }, { "name": "31194", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31194" }, { "name": "asterisk-poke-dos(43942)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43942" }, { "name": "ADV-2008-2168", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2168/references" }, { "name": "FEDORA-2008-6676", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html" }, { "name": "31178", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31178" }, { "name": "http://downloads.securityfocus.com/vulnerabilities/exploits/30321.pl", "refsource": "MISC", "url": "http://downloads.securityfocus.com/vulnerabilities/exploits/30321.pl" }, { "name": "20080722 AST-2008-010: Asterisk IAX \u0027POKE\u0027 resource exhaustion", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/494675/100/0/threaded" }, { "name": "1020535", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020535" }, { "name": "http://downloads.digium.com/pub/security/AST-2008-010.html", "refsource": "CONFIRM", "url": "http://downloads.digium.com/pub/security/AST-2008-010.html" }, { "name": "34982", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34982" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-3263", "datePublished": "2008-07-22T23:00:00", "dateReserved": "2008-07-22T00:00:00", "dateUpdated": "2024-08-07T09:28:41.740Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-3764
Vulnerability from cvelistv5
Published
2007-07-18 17:00
Modified
2024-08-07 14:28
Severity ?
EPSS score ?
Summary
The Skinny channel driver (chan_skinny) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a certain data length value in a crafted packet, which results in an "overly large memcpy."
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/26099 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/24950 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id?1018407 | vdb-entry, x_refsource_SECTRACK | |
http://security.gentoo.org/glsa/glsa-200802-11.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/29051 | third-party-advisory, x_refsource_SECUNIA | |
http://bugs.gentoo.org/show_bug.cgi?id=185713 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35478 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2007/2563 | vdb-entry, x_refsource_VUPEN | |
http://ftp.digium.com/pub/asa/ASA-2007-016.pdf | x_refsource_CONFIRM | |
http://www.debian.org/security/2007/dsa-1358 | vendor-advisory, x_refsource_DEBIAN | |
http://www.novell.com/linux/security/advisories/2007_15_sr.html | vendor-advisory, x_refsource_SUSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:28:52.239Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "26099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26099" }, { "name": "24950", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24950" }, { "name": "1018407", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018407" }, { "name": "GLSA-200802-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "name": "29051", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29051" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "name": "asterisk-skinny-driver-dos(35478)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35478" }, { "name": "ADV-2007-2563", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-016.pdf" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "SUSE-SR:2007:015", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The Skinny channel driver (chan_skinny) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a certain data length value in a crafted packet, which results in an \"overly large memcpy.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "26099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26099" }, { "name": "24950", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24950" }, { "name": "1018407", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018407" }, { "name": "GLSA-200802-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "name": "29051", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29051" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "name": "asterisk-skinny-driver-dos(35478)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35478" }, { "name": "ADV-2007-2563", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-016.pdf" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "SUSE-SR:2007:015", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3764", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Skinny channel driver (chan_skinny) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a certain data length value in a crafted packet, which results in an \"overly large memcpy.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "26099", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26099" }, { "name": "24950", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24950" }, { "name": "1018407", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018407" }, { "name": "GLSA-200802-11", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "name": "29051", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29051" }, { "name": "http://bugs.gentoo.org/show_bug.cgi?id=185713", "refsource": "CONFIRM", "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "name": "asterisk-skinny-driver-dos(35478)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35478" }, { "name": "ADV-2007-2563", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "name": "http://ftp.digium.com/pub/asa/ASA-2007-016.pdf", "refsource": "CONFIRM", "url": "http://ftp.digium.com/pub/asa/ASA-2007-016.pdf" }, { "name": "DSA-1358", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "SUSE-SR:2007:015", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3764", "datePublished": "2007-07-18T17:00:00", "dateReserved": "2007-07-13T00:00:00", "dateUpdated": "2024-08-07T14:28:52.239Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-2346
Vulnerability from cvelistv5
Published
2009-09-08 18:00
Modified
2024-08-07 05:44
Severity ?
EPSS score ?
Summary
The IAX2 protocol implementation in Asterisk Open Source 1.2.x before 1.2.35, 1.4.x before 1.4.26.2, 1.6.0.x before 1.6.0.15, and 1.6.1.x before 1.6.1.6; Business Edition B.x.x before B.2.5.10, C.2.x before C.2.4.3, and C.3.x before C.3.1.1; and s800i 1.3.x before 1.3.0.3 allows remote attackers to cause a denial of service (call-number exhaustion) by initiating many IAX2 message exchanges, a related issue to CVE-2008-3263.
References
▼ | URL | Tags |
---|---|---|
http://securitytracker.com/id?1022819 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/archive/1/506257/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/36593 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/36275 | vdb-entry, x_refsource_BID | |
http://downloads.asterisk.org/pub/security/AST-2009-006.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:44:55.999Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1022819", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1022819" }, { "name": "20090903 AST-2009-006: IAX2 Call Number Resource Exhaustion", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/506257/100/0/threaded" }, { "name": "36593", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36593" }, { "name": "36275", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36275" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.asterisk.org/pub/security/AST-2009-006.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-09-03T00:00:00", "descriptions": [ { "lang": "en", "value": "The IAX2 protocol implementation in Asterisk Open Source 1.2.x before 1.2.35, 1.4.x before 1.4.26.2, 1.6.0.x before 1.6.0.15, and 1.6.1.x before 1.6.1.6; Business Edition B.x.x before B.2.5.10, C.2.x before C.2.4.3, and C.3.x before C.3.1.1; and s800i 1.3.x before 1.3.0.3 allows remote attackers to cause a denial of service (call-number exhaustion) by initiating many IAX2 message exchanges, a related issue to CVE-2008-3263." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1022819", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1022819" }, { "name": "20090903 AST-2009-006: IAX2 Call Number Resource Exhaustion", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/506257/100/0/threaded" }, { "name": "36593", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36593" }, { "name": "36275", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36275" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.asterisk.org/pub/security/AST-2009-006.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2346", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The IAX2 protocol implementation in Asterisk Open Source 1.2.x before 1.2.35, 1.4.x before 1.4.26.2, 1.6.0.x before 1.6.0.15, and 1.6.1.x before 1.6.1.6; Business Edition B.x.x before B.2.5.10, C.2.x before C.2.4.3, and C.3.x before C.3.1.1; and s800i 1.3.x before 1.3.0.3 allows remote attackers to cause a denial of service (call-number exhaustion) by initiating many IAX2 message exchanges, a related issue to CVE-2008-3263." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1022819", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1022819" }, { "name": "20090903 AST-2009-006: IAX2 Call Number Resource Exhaustion", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/506257/100/0/threaded" }, { "name": "36593", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36593" }, { "name": "36275", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36275" }, { "name": "http://downloads.asterisk.org/pub/security/AST-2009-006.html", "refsource": "CONFIRM", "url": "http://downloads.asterisk.org/pub/security/AST-2009-006.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2346", "datePublished": "2009-09-08T18:00:00", "dateReserved": "2009-07-07T00:00:00", "dateUpdated": "2024-08-07T05:44:55.999Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-4455
Vulnerability from cvelistv5
Published
2007-08-22 01:00
Modified
2024-08-07 14:53
Severity ?
EPSS score ?
Summary
The SIP channel driver (chan_sip) in Asterisk Open Source 1.4.x before 1.4.11, AsteriskNOW before beta7, Asterisk Appliance Developer Kit 0.x before 0.8.0, and s800i (Asterisk Appliance) 1.x before 1.0.3 allows remote attackers to cause a denial of service (memory exhaustion) via a SIP dialog that causes a large number of history entries to be created.
References
▼ | URL | Tags |
---|---|---|
http://securityreason.com/securityalert/3047 | third-party-advisory, x_refsource_SREASON | |
http://www.vupen.com/english/advisories/2007/2953 | vdb-entry, x_refsource_VUPEN | |
http://downloads.digium.com/pub/asa/AST-2007-020.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/25392 | vdb-entry, x_refsource_BID | |
http://seclists.org/fulldisclosure/2007/Aug/0393.html | mailing-list, x_refsource_FULLDISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/36145 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/26553 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id?1018595 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:53:55.958Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "3047", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3047" }, { "name": "ADV-2007-2953", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2953" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.digium.com/pub/asa/AST-2007-020.html" }, { "name": "25392", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25392" }, { "name": "20070821 AST-2007-020: Resource Exhaustion Vulnerability in Asterisk SIP channel driver", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2007/Aug/0393.html" }, { "name": "asterisk-sip-dialoghistory-dos(36145)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36145" }, { "name": "26553", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26553" }, { "name": "1018595", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018595" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-08-21T00:00:00", "descriptions": [ { "lang": "en", "value": "The SIP channel driver (chan_sip) in Asterisk Open Source 1.4.x before 1.4.11, AsteriskNOW before beta7, Asterisk Appliance Developer Kit 0.x before 0.8.0, and s800i (Asterisk Appliance) 1.x before 1.0.3 allows remote attackers to cause a denial of service (memory exhaustion) via a SIP dialog that causes a large number of history entries to be created." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "3047", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3047" }, { "name": "ADV-2007-2953", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2953" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.digium.com/pub/asa/AST-2007-020.html" }, { "name": "25392", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25392" }, { "name": "20070821 AST-2007-020: Resource Exhaustion Vulnerability in Asterisk SIP channel driver", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2007/Aug/0393.html" }, { "name": "asterisk-sip-dialoghistory-dos(36145)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36145" }, { "name": "26553", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26553" }, { "name": "1018595", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018595" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4455", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SIP channel driver (chan_sip) in Asterisk Open Source 1.4.x before 1.4.11, AsteriskNOW before beta7, Asterisk Appliance Developer Kit 0.x before 0.8.0, and s800i (Asterisk Appliance) 1.x before 1.0.3 allows remote attackers to cause a denial of service (memory exhaustion) via a SIP dialog that causes a large number of history entries to be created." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "3047", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3047" }, { "name": "ADV-2007-2953", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2953" }, { "name": "http://downloads.digium.com/pub/asa/AST-2007-020.html", "refsource": "CONFIRM", "url": "http://downloads.digium.com/pub/asa/AST-2007-020.html" }, { "name": "25392", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25392" }, { "name": "20070821 AST-2007-020: Resource Exhaustion Vulnerability in Asterisk SIP channel driver", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2007/Aug/0393.html" }, { "name": "asterisk-sip-dialoghistory-dos(36145)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36145" }, { "name": "26553", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26553" }, { "name": "1018595", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018595" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4455", "datePublished": "2007-08-22T01:00:00", "dateReserved": "2007-08-21T00:00:00", "dateUpdated": "2024-08-07T14:53:55.958Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-2488
Vulnerability from cvelistv5
Published
2007-05-07 19:00
Modified
2024-08-07 13:42
Severity ?
EPSS score ?
Summary
The IAX2 channel driver (chan_iax2) in Asterisk before 20070504 does not properly null terminate data, which allows remote attackers to trigger loss of transmitted data, and possibly obtain sensitive information (memory contents) or cause a denial of service (application crash), by sending a frame that lacks a 0 byte.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2007/1661 | vdb-entry, x_refsource_VUPEN | |
http://www.novell.com/linux/security/advisories/2007_34_asterisk.html | vendor-advisory, x_refsource_SUSE | |
http://osvdb.org/35769 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/34085 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/25582 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/25134 | third-party-advisory, x_refsource_SECUNIA | |
http://ftp.digium.com/pub/asa/ASA-2007-013.pdf | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/23824 | vdb-entry, x_refsource_BID | |
http://www.debian.org/security/2007/dsa-1358 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:42:33.558Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2007-1661", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1661" }, { "name": "SUSE-SA:2007:034", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "35769", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/35769" }, { "name": "asterisk-iax2-information-disclosure(34085)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34085" }, { "name": "25582", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25582" }, { "name": "25134", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25134" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-013.pdf" }, { "name": "23824", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/23824" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1358" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-05-04T00:00:00", "descriptions": [ { "lang": "en", "value": "The IAX2 channel driver (chan_iax2) in Asterisk before 20070504 does not properly null terminate data, which allows remote attackers to trigger loss of transmitted data, and possibly obtain sensitive information (memory contents) or cause a denial of service (application crash), by sending a frame that lacks a 0 byte." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2007-1661", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1661" }, { "name": "SUSE-SA:2007:034", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "35769", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/35769" }, { "name": "asterisk-iax2-information-disclosure(34085)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34085" }, { "name": "25582", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25582" }, { "name": "25134", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25134" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-013.pdf" }, { "name": "23824", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/23824" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1358" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-2488", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The IAX2 channel driver (chan_iax2) in Asterisk before 20070504 does not properly null terminate data, which allows remote attackers to trigger loss of transmitted data, and possibly obtain sensitive information (memory contents) or cause a denial of service (application crash), by sending a frame that lacks a 0 byte." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2007-1661", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1661" }, { "name": "SUSE-SA:2007:034", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "35769", "refsource": "OSVDB", "url": "http://osvdb.org/35769" }, { "name": "asterisk-iax2-information-disclosure(34085)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34085" }, { "name": "25582", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25582" }, { "name": "25134", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25134" }, { "name": "http://ftp.digium.com/pub/asa/ASA-2007-013.pdf", "refsource": "CONFIRM", "url": "http://ftp.digium.com/pub/asa/ASA-2007-013.pdf" }, { "name": "23824", "refsource": "BID", "url": "http://www.securityfocus.com/bid/23824" }, { "name": "DSA-1358", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1358" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-2488", "datePublished": "2007-05-07T19:00:00", "dateReserved": "2007-05-03T00:00:00", "dateUpdated": "2024-08-07T13:42:33.558Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49786
Vulnerability from cvelistv5
Published
2023-12-14 19:47
Modified
2024-10-08 14:20
Severity ?
EPSS score ?
Summary
Asterisk susceptible to Denial of Service via DTLS Hello packets during call initiation
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:01:25.997Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-hxj9-xwr8-w8pq", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-hxj9-xwr8-w8pq" }, { "name": "https://github.com/asterisk/asterisk/commit/d7d7764cb07c8a1872804321302ef93bf62cba05", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/asterisk/asterisk/commit/d7d7764cb07c8a1872804321302ef93bf62cba05" }, { "name": "https://github.com/EnableSecurity/advisories/tree/master/ES2023-01-asterisk-dtls-hello-race", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/EnableSecurity/advisories/tree/master/ES2023-01-asterisk-dtls-hello-race" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2023/12/15/7" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/176251/Asterisk-20.1.0-Denial-Of-Service.html" }, { "tags": [ "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2023/Dec/24" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-49786", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-08T14:19:55.907894Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-08T14:20:19.222Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "asterisk", "vendor": "asterisk", "versions": [ { "status": "affected", "version": "\u003c 18.20.1" }, { "status": "affected", "version": "\u003e= 19.0.0, \u003c 20.5.1" }, { "status": "affected", "version": "= 21.0.0" }, { "status": "affected", "version": "\u003c 18.9-cert6" } ] } ], "descriptions": [ { "lang": "en", "value": "Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versions 18.20.1, 20.5.1, and 21.0.1; as well as certified-asterisk prior to 18.9-cert6; Asterisk is susceptible to a DoS due to a race condition in the hello handshake phase of the DTLS protocol when handling DTLS-SRTP for media setup. This attack can be done continuously, thus denying new DTLS-SRTP encrypted calls during the attack. Abuse of this vulnerability may lead to a massive Denial of Service on vulnerable Asterisk servers for calls that rely on DTLS-SRTP. Commit d7d7764cb07c8a1872804321302ef93bf62cba05 contains a fix, which is part of versions 18.20.1, 20.5.1, 21.0.1, amd 18.9-cert6." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-703", "description": "CWE-703: Improper Check or Handling of Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-14T19:47:46.306Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-hxj9-xwr8-w8pq", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-hxj9-xwr8-w8pq" }, { "name": "https://github.com/asterisk/asterisk/commit/d7d7764cb07c8a1872804321302ef93bf62cba05", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/commit/d7d7764cb07c8a1872804321302ef93bf62cba05" }, { "name": "https://github.com/EnableSecurity/advisories/tree/master/ES2023-01-asterisk-dtls-hello-race", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/EnableSecurity/advisories/tree/master/ES2023-01-asterisk-dtls-hello-race" }, { "url": "http://www.openwall.com/lists/oss-security/2023/12/15/7" }, { "url": "http://packetstormsecurity.com/files/176251/Asterisk-20.1.0-Denial-Of-Service.html" }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/24" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html" } ], "source": { "advisory": "GHSA-hxj9-xwr8-w8pq", "discovery": "UNKNOWN" }, "title": "Asterisk susceptible to Denial of Service via DTLS Hello packets during call initiation" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-49786", "datePublished": "2023-12-14T19:47:46.306Z", "dateReserved": "2023-11-30T13:39:50.862Z", "dateUpdated": "2024-10-08T14:20:19.222Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-1595
Vulnerability from cvelistv5
Published
2007-03-22 23:00
Modified
2024-08-07 12:59
Severity ?
EPSS score ?
Summary
The Asterisk Extension Language (AEL) in pbx/pbx_ael.c in Asterisk does not properly generate extensions, which allows remote attackers to execute arbitrary extensions and have an unknown impact by specifying an invalid extension in a certain form.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/23155 | vdb-entry, x_refsource_BID | |
http://svn.digium.com/view/asterisk?rev=59073&view=rev | x_refsource_CONFIRM | |
http://www.novell.com/linux/security/advisories/2007_34_asterisk.html | vendor-advisory, x_refsource_SUSE | |
http://bugs.digium.com/view.php?id=9316 | x_refsource_MISC | |
http://secunia.com/advisories/25582 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/24694 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2007/1123 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:59:08.853Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "23155", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/23155" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.digium.com/view/asterisk?rev=59073\u0026view=rev" }, { "name": "SUSE-SA:2007:034", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.digium.com/view.php?id=9316" }, { "name": "25582", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25582" }, { "name": "24694", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24694" }, { "name": "ADV-2007-1123", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1123" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-03-19T00:00:00", "descriptions": [ { "lang": "en", "value": "The Asterisk Extension Language (AEL) in pbx/pbx_ael.c in Asterisk does not properly generate extensions, which allows remote attackers to execute arbitrary extensions and have an unknown impact by specifying an invalid extension in a certain form." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-04-12T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "23155", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/23155" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.digium.com/view/asterisk?rev=59073\u0026view=rev" }, { "name": "SUSE-SA:2007:034", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.digium.com/view.php?id=9316" }, { "name": "25582", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25582" }, { "name": "24694", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24694" }, { "name": "ADV-2007-1123", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1123" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-1595", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Asterisk Extension Language (AEL) in pbx/pbx_ael.c in Asterisk does not properly generate extensions, which allows remote attackers to execute arbitrary extensions and have an unknown impact by specifying an invalid extension in a certain form." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "23155", "refsource": "BID", "url": "http://www.securityfocus.com/bid/23155" }, { "name": "http://svn.digium.com/view/asterisk?rev=59073\u0026view=rev", "refsource": "CONFIRM", "url": "http://svn.digium.com/view/asterisk?rev=59073\u0026view=rev" }, { "name": "SUSE-SA:2007:034", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "http://bugs.digium.com/view.php?id=9316", "refsource": "MISC", "url": "http://bugs.digium.com/view.php?id=9316" }, { "name": "25582", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25582" }, { "name": "24694", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24694" }, { "name": "ADV-2007-1123", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1123" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-1595", "datePublished": "2007-03-22T23:00:00", "dateReserved": "2007-03-22T00:00:00", "dateUpdated": "2024-08-07T12:59:08.853Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-3765
Vulnerability from cvelistv5
Published
2007-07-18 17:00
Modified
2024-08-07 14:28
Severity ?
EPSS score ?
Summary
The STUN implementation in Asterisk 1.4.x before 1.4.8, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted STUN length attribute in a STUN packet sent on an RTP port.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/26099 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/24950 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id?1018407 | vdb-entry, x_refsource_SECTRACK | |
http://ftp.digium.com/pub/asa/ASA-2007-017.pdf | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35480 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2007/2563 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:28:52.295Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "26099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26099" }, { "name": "24950", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24950" }, { "name": "1018407", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018407" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-017.pdf" }, { "name": "asterisk-stun-dos(35480)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35480" }, { "name": "ADV-2007-2563", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2563" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The STUN implementation in Asterisk 1.4.x before 1.4.8, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted STUN length attribute in a STUN packet sent on an RTP port." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "26099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26099" }, { "name": "24950", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24950" }, { "name": "1018407", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018407" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-017.pdf" }, { "name": "asterisk-stun-dos(35480)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35480" }, { "name": "ADV-2007-2563", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2563" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3765", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The STUN implementation in Asterisk 1.4.x before 1.4.8, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted STUN length attribute in a STUN packet sent on an RTP port." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "26099", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26099" }, { "name": "24950", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24950" }, { "name": "1018407", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018407" }, { "name": "http://ftp.digium.com/pub/asa/ASA-2007-017.pdf", "refsource": "CONFIRM", "url": "http://ftp.digium.com/pub/asa/ASA-2007-017.pdf" }, { "name": "asterisk-stun-dos(35480)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35480" }, { "name": "ADV-2007-2563", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2563" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3765", "datePublished": "2007-07-18T17:00:00", "dateReserved": "2007-07-13T00:00:00", "dateUpdated": "2024-08-07T14:28:52.295Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42491
Vulnerability from cvelistv5
Published
2024-09-05 17:17
Modified
2024-09-05 18:52
Severity ?
EPSS score ?
Summary
A malformed Contact or Record-Route URI in an incoming SIP request can cause Asterisk to crash when res_resolver_unbound is used
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42491", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-05T18:48:24.364960Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-05T18:52:42.844Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "asterisk", "vendor": "asterisk", "versions": [ { "status": "affected", "version": "\u003c 18.24.3" }, { "status": "affected", "version": "\u003e= 19.0.0, \u003c 20.9.3" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.4.3" }, { "status": "affected", "version": "\u003c 18.9-cert12" }, { "status": "affected", "version": "\u003e= 19.0, \u003c 20.7-cert2" } ] } ], "descriptions": [ { "lang": "en", "value": "Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.24.3, 20.9.3, and 21.4.3 of Asterisk and versions 18.9-cert12 and 20.7-cert2 of certified-asterisk, if Asterisk attempts to send a SIP request to a URI whose host portion starts with `.1` or `[.1]`, and res_resolver_unbound is loaded, Asterisk will crash with a SEGV. To receive a patch, users should upgrade to one of the following versions: 18.24.3, 20.9.3, 21.4.3, certified-18.9-cert12, certified-20.7-cert2. Two workarounds are available. Disable res_resolver_unbound by setting `noload = res_resolver_unbound.so` in modules.conf, or set `rewrite_contact = yes` on all PJSIP endpoints. NOTE: This may not be appropriate for all Asterisk configurations." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-252", "description": "CWE-252: Unchecked Return Value", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476: NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-05T17:17:56.961Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-v428-g3cw-7hv9", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-v428-g3cw-7hv9" }, { "name": "https://github.com/asterisk/asterisk/commit/42a2f4ccfa2c7062a15063e765916b3332e34cc4", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/commit/42a2f4ccfa2c7062a15063e765916b3332e34cc4" }, { "name": "https://github.com/asterisk/asterisk/commit/4f01669c7c41c9184f3cce9a3cf1b2ebf6201742", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/commit/4f01669c7c41c9184f3cce9a3cf1b2ebf6201742" }, { "name": "https://github.com/asterisk/asterisk/commit/50bf8d4d3064930d28ecf1ce3397b14574d514d2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/commit/50bf8d4d3064930d28ecf1ce3397b14574d514d2" }, { "name": "https://github.com/asterisk/asterisk/commit/7a0090325bfa9d778a39ae5f7d0a98109e4651c8", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/commit/7a0090325bfa9d778a39ae5f7d0a98109e4651c8" }, { "name": "https://github.com/asterisk/asterisk/commit/a15050650abf09c10a3c135fab148220cd41d3a0", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/commit/a15050650abf09c10a3c135fab148220cd41d3a0" } ], "source": { "advisory": "GHSA-v428-g3cw-7hv9", "discovery": "UNKNOWN" }, "title": "A malformed Contact or Record-Route URI in an incoming SIP request can cause Asterisk to crash when res_resolver_unbound is used" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-42491", "datePublished": "2024-09-05T17:17:56.961Z", "dateReserved": "2024-08-02T14:13:04.619Z", "dateUpdated": "2024-09-05T18:52:42.844Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-0441
Vulnerability from cvelistv5
Published
2010-02-04 18:00
Modified
2024-08-07 00:52
Severity ?
EPSS score ?
Summary
Asterisk Open Source 1.6.0.x before 1.6.0.22, 1.6.1.x before 1.6.1.14, and 1.6.2.x before 1.6.2.2, and Business Edition C.3 before C.3.3.2, allows remote attackers to cause a denial of service (daemon crash) via an SIP T.38 negotiation with an SDP FaxMaxDatagram field that is (1) missing, (2) modified to contain a negative number, or (3) modified to contain a large number.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:52:18.727Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.1.diff" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.asterisk.org/view.php?id=16517" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.asterisk.org/view.php?id=16634" }, { "name": "ADV-2010-0289", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/0289" }, { "name": "38047", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/38047" }, { "name": "39096", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/39096" }, { "name": "FEDORA-2010-3724", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037679.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.asterisk.org/view.php?id=16724" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.2.diff" }, { "name": "20100202 AST-2010-001: T.38 Remote Crash Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/509327/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.0.diff" }, { "name": "38395", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38395" }, { "name": "1023532", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023532" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.asterisk.org/pub/security/AST-2010-001.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-02-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Asterisk Open Source 1.6.0.x before 1.6.0.22, 1.6.1.x before 1.6.1.14, and 1.6.2.x before 1.6.2.2, and Business Edition C.3 before C.3.3.2, allows remote attackers to cause a denial of service (daemon crash) via an SIP T.38 negotiation with an SDP FaxMaxDatagram field that is (1) missing, (2) modified to contain a negative number, or (3) modified to contain a large number." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.1.diff" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.asterisk.org/view.php?id=16517" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.asterisk.org/view.php?id=16634" }, { "name": "ADV-2010-0289", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/0289" }, { "name": "38047", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/38047" }, { "name": "39096", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/39096" }, { "name": "FEDORA-2010-3724", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037679.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.asterisk.org/view.php?id=16724" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.2.diff" }, { "name": "20100202 AST-2010-001: T.38 Remote Crash Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/509327/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.0.diff" }, { "name": "38395", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38395" }, { "name": "1023532", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023532" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.asterisk.org/pub/security/AST-2010-001.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-0441", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Asterisk Open Source 1.6.0.x before 1.6.0.22, 1.6.1.x before 1.6.1.14, and 1.6.2.x before 1.6.2.2, and Business Edition C.3 before C.3.3.2, allows remote attackers to cause a denial of service (daemon crash) via an SIP T.38 negotiation with an SDP FaxMaxDatagram field that is (1) missing, (2) modified to contain a negative number, or (3) modified to contain a large number." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.1.diff", "refsource": "CONFIRM", "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.1.diff" }, { "name": "https://issues.asterisk.org/view.php?id=16517", "refsource": "CONFIRM", "url": "https://issues.asterisk.org/view.php?id=16517" }, { "name": "https://issues.asterisk.org/view.php?id=16634", "refsource": "CONFIRM", "url": "https://issues.asterisk.org/view.php?id=16634" }, { "name": "ADV-2010-0289", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/0289" }, { "name": "38047", "refsource": "BID", "url": "http://www.securityfocus.com/bid/38047" }, { "name": "39096", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/39096" }, { "name": "FEDORA-2010-3724", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037679.html" }, { "name": "https://issues.asterisk.org/view.php?id=16724", "refsource": "CONFIRM", "url": "https://issues.asterisk.org/view.php?id=16724" }, { "name": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.2.diff", "refsource": "CONFIRM", "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.2.diff" }, { "name": "20100202 AST-2010-001: T.38 Remote Crash Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/509327/100/0/threaded" }, { "name": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.0.diff", "refsource": "CONFIRM", "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.0.diff" }, { "name": "38395", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38395" }, { "name": "1023532", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023532" }, { "name": "http://downloads.asterisk.org/pub/security/AST-2010-001.html", "refsource": "CONFIRM", "url": "http://downloads.asterisk.org/pub/security/AST-2010-001.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-0441", "datePublished": "2010-02-04T18:00:00", "dateReserved": "2010-01-27T00:00:00", "dateUpdated": "2024-08-07T00:52:18.727Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37457
Vulnerability from cvelistv5
Published
2023-12-14 19:43
Modified
2024-08-02 17:16
Severity ?
EPSS score ?
Summary
Asterisk's PJSIP_HEADER dialplan function can overwrite memory/cause crash when using 'update'
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:16:30.273Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-98rc-4j27-74hh", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-98rc-4j27-74hh" }, { "name": "https://github.com/asterisk/asterisk/commit/a1ca0268254374b515fa5992f01340f7717113fa", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/asterisk/asterisk/commit/a1ca0268254374b515fa5992f01340f7717113fa" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "asterisk", "vendor": "asterisk", "versions": [ { "status": "affected", "version": "\u003c= 18.20.0" }, { "status": "affected", "version": "\u003e= 19.0.0, \u003c= 20.5.0" }, { "status": "affected", "version": "= 21.0.0" }, { "status": "affected", "version": " \u003c= 18.9-cert5" } ] } ], "descriptions": [ { "lang": "en", "value": "Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk versions 18.20.0 and prior, 20.5.0 and prior, and 21.0.0; as well as ceritifed-asterisk 18.9-cert5 and prior, the \u0027update\u0027 functionality of the PJSIP_HEADER dialplan function can exceed the available buffer space for storing the new value of a header. By doing so this can overwrite memory or cause a crash. This is not externally exploitable, unless dialplan is explicitly written to update a header based on data from an outside source. If the \u0027update\u0027 functionality is not used the vulnerability does not occur. A patch is available at commit a1ca0268254374b515fa5992f01340f7717113fa." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-14T19:43:30.945Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-98rc-4j27-74hh", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-98rc-4j27-74hh" }, { "name": "https://github.com/asterisk/asterisk/commit/a1ca0268254374b515fa5992f01340f7717113fa", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/commit/a1ca0268254374b515fa5992f01340f7717113fa" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html" } ], "source": { "advisory": "GHSA-98rc-4j27-74hh", "discovery": "UNKNOWN" }, "title": "Asterisk\u0027s PJSIP_HEADER dialplan function can overwrite memory/cause crash when using \u0027update\u0027" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-37457", "datePublished": "2023-12-14T19:43:30.945Z", "dateReserved": "2023-07-06T13:01:36.996Z", "dateUpdated": "2024-08-02T17:16:30.273Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-2297
Vulnerability from cvelistv5
Published
2007-04-26 20:00
Modified
2024-08-07 13:33
Severity ?
EPSS score ?
Summary
The SIP channel driver (chan_sip) in Asterisk before 1.2.18 and 1.4.x before 1.4.3 does not properly parse SIP UDP packets that do not contain a valid response code, which allows remote attackers to cause a denial of service (crash).
References
▼ | URL | Tags |
---|---|---|
http://www.asterisk.org/files/ASA-2007-011.pdf | x_refsource_CONFIRM | |
http://bugs.digium.com/view.php?id=9313 | x_refsource_MISC | |
http://www.novell.com/linux/security/advisories/2007_34_asterisk.html | vendor-advisory, x_refsource_SUSE | |
http://www.securitytracker.com/id?1017954 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/24359 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/466882/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/25582 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/33892 | vdb-entry, x_refsource_XF | |
http://securityreason.com/securityalert/2644 | third-party-advisory, x_refsource_SREASON | |
http://www.debian.org/security/2007/dsa-1358 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:33:28.286Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.asterisk.org/files/ASA-2007-011.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.digium.com/view.php?id=9313" }, { "name": "SUSE-SA:2007:034", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "1017954", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1017954" }, { "name": "24359", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24359" }, { "name": "20070425 ASA-2007-011: Multiple problems in SIP channel parser handling response codes", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/466882/100/0/threaded" }, { "name": "25582", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25582" }, { "name": "asterisk-sip-response-dos(33892)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33892" }, { "name": "2644", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2644" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1358" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-04-25T00:00:00", "descriptions": [ { "lang": "en", "value": "The SIP channel driver (chan_sip) in Asterisk before 1.2.18 and 1.4.x before 1.4.3 does not properly parse SIP UDP packets that do not contain a valid response code, which allows remote attackers to cause a denial of service (crash)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.asterisk.org/files/ASA-2007-011.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.digium.com/view.php?id=9313" }, { "name": "SUSE-SA:2007:034", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "1017954", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1017954" }, { "name": "24359", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24359" }, { "name": "20070425 ASA-2007-011: Multiple problems in SIP channel parser handling response codes", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/466882/100/0/threaded" }, { "name": "25582", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25582" }, { "name": "asterisk-sip-response-dos(33892)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33892" }, { "name": "2644", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2644" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1358" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-2297", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SIP channel driver (chan_sip) in Asterisk before 1.2.18 and 1.4.x before 1.4.3 does not properly parse SIP UDP packets that do not contain a valid response code, which allows remote attackers to cause a denial of service (crash)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.asterisk.org/files/ASA-2007-011.pdf", "refsource": "CONFIRM", "url": "http://www.asterisk.org/files/ASA-2007-011.pdf" }, { "name": "http://bugs.digium.com/view.php?id=9313", "refsource": "MISC", "url": "http://bugs.digium.com/view.php?id=9313" }, { "name": "SUSE-SA:2007:034", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "1017954", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1017954" }, { "name": "24359", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24359" }, { "name": "20070425 ASA-2007-011: Multiple problems in SIP channel parser handling response codes", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/466882/100/0/threaded" }, { "name": "25582", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25582" }, { "name": "asterisk-sip-response-dos(33892)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33892" }, { "name": "2644", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2644" }, { "name": "DSA-1358", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1358" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-2297", "datePublished": "2007-04-26T20:00:00", "dateReserved": "2007-04-26T00:00:00", "dateUpdated": "2024-08-07T13:33:28.286Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-4280
Vulnerability from cvelistv5
Published
2007-08-09 21:00
Modified
2024-08-07 14:46
Severity ?
EPSS score ?
Summary
The Skinny channel driver (chan_skinny) in Asterisk Open Source before 1.4.10, AsteriskNOW before beta7, Appliance Developer Kit before 0.7.0, and Appliance s800i before 1.0.3 allows remote authenticated users to cause a denial of service (application crash) via a CAPABILITIES_RES_MESSAGE packet with a capabilities count larger than the capabilities_res_message array population.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2007/2808 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/26340 | third-party-advisory, x_refsource_SECUNIA | |
http://downloads.digium.com/pub/asa/ASA-2007-019.pdf | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35870 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/25228 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id?1018536 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:46:39.690Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2007-2808", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2808" }, { "name": "26340", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26340" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.digium.com/pub/asa/ASA-2007-019.pdf" }, { "name": "asterisk-skinny-channel-dos(35870)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35870" }, { "name": "25228", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25228" }, { "name": "1018536", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018536" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-08-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The Skinny channel driver (chan_skinny) in Asterisk Open Source before 1.4.10, AsteriskNOW before beta7, Appliance Developer Kit before 0.7.0, and Appliance s800i before 1.0.3 allows remote authenticated users to cause a denial of service (application crash) via a CAPABILITIES_RES_MESSAGE packet with a capabilities count larger than the capabilities_res_message array population." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2007-2808", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2808" }, { "name": "26340", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26340" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.digium.com/pub/asa/ASA-2007-019.pdf" }, { "name": "asterisk-skinny-channel-dos(35870)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35870" }, { "name": "25228", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25228" }, { "name": "1018536", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018536" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4280", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Skinny channel driver (chan_skinny) in Asterisk Open Source before 1.4.10, AsteriskNOW before beta7, Appliance Developer Kit before 0.7.0, and Appliance s800i before 1.0.3 allows remote authenticated users to cause a denial of service (application crash) via a CAPABILITIES_RES_MESSAGE packet with a capabilities count larger than the capabilities_res_message array population." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2007-2808", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2808" }, { "name": "26340", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26340" }, { "name": "http://downloads.digium.com/pub/asa/ASA-2007-019.pdf", "refsource": "CONFIRM", "url": "http://downloads.digium.com/pub/asa/ASA-2007-019.pdf" }, { "name": "asterisk-skinny-channel-dos(35870)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35870" }, { "name": "25228", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25228" }, { "name": "1018536", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018536" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4280", "datePublished": "2007-08-09T21:00:00", "dateReserved": "2007-08-09T00:00:00", "dateUpdated": "2024-08-07T14:46:39.690Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1390
Vulnerability from cvelistv5
Published
2008-03-24 17:00
Modified
2024-08-07 08:17
Severity ?
EPSS score ?
Summary
The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses.
References
▼ | URL | Tags |
---|---|---|
http://securityreason.com/securityalert/3764 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/bid/28316 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/489819/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41304 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/29449 | third-party-advisory, x_refsource_SECUNIA | |
http://downloads.digium.com/pub/security/AST-2008-005.html | x_refsource_CONFIRM | |
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html | vendor-advisory, x_refsource_FEDORA | |
http://www.securitytracker.com/id?1019679 | vdb-entry, x_refsource_SECTRACK | |
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html | vendor-advisory, x_refsource_FEDORA | |
http://secunia.com/advisories/29470 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:17:34.588Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "3764", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3764" }, { "name": "28316", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28316" }, { "name": "20080318 AST-2008-005: HTTP Manager ID is predictable", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/489819/100/0/threaded" }, { "name": "asterisk-httpmanagerid-weak-security(41304)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41304" }, { "name": "29449", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29449" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.digium.com/pub/security/AST-2008-005.html" }, { "name": "FEDORA-2008-2554", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html" }, { "name": "1019679", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019679" }, { "name": "FEDORA-2008-2620", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html" }, { "name": "29470", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29470" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-18T00:00:00", "descriptions": [ { "lang": "en", "value": "The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "3764", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3764" }, { "name": "28316", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28316" }, { "name": "20080318 AST-2008-005: HTTP Manager ID is predictable", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/489819/100/0/threaded" }, { "name": "asterisk-httpmanagerid-weak-security(41304)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41304" }, { "name": "29449", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29449" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.digium.com/pub/security/AST-2008-005.html" }, { "name": "FEDORA-2008-2554", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html" }, { "name": "1019679", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019679" }, { "name": "FEDORA-2008-2620", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html" }, { "name": "29470", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29470" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1390", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "3764", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3764" }, { "name": "28316", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28316" }, { "name": "20080318 AST-2008-005: HTTP Manager ID is predictable", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/489819/100/0/threaded" }, { "name": "asterisk-httpmanagerid-weak-security(41304)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41304" }, { "name": "29449", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29449" }, { "name": "http://downloads.digium.com/pub/security/AST-2008-005.html", "refsource": "CONFIRM", "url": "http://downloads.digium.com/pub/security/AST-2008-005.html" }, { "name": "FEDORA-2008-2554", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html" }, { "name": "1019679", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019679" }, { "name": "FEDORA-2008-2620", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html" }, { "name": "29470", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29470" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1390", "datePublished": "2008-03-24T17:00:00", "dateReserved": "2008-03-18T00:00:00", "dateUpdated": "2024-08-07T08:17:34.588Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-35190
Vulnerability from cvelistv5
Published
2024-05-17 16:55
Modified
2024-08-02 03:07
Severity ?
EPSS score ?
Summary
Asterisk' res_pjsip_endpoint_identifier_ip: wrongly matches ALL unauthorized SIP requests
References
▼ | URL | Tags |
---|---|---|
https://github.com/asterisk/asterisk/security/advisories/GHSA-qqxj-v78h-hrf9 | x_refsource_CONFIRM | |
https://github.com/asterisk/asterisk/pull/600 | x_refsource_MISC | |
https://github.com/asterisk/asterisk/pull/602 | x_refsource_MISC | |
https://github.com/asterisk/asterisk/commit/85241bd22936cc15760fd1f65d16c98be7aeaf6d | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:asterisk:asterisk:21.3.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "asterisk", "vendor": "asterisk", "versions": [ { "status": "affected", "version": "21.3.0" } ] }, { "cpes": [ "cpe:2.3:a:asterisk:asterisk:20.8.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "asterisk", "vendor": "asterisk", "versions": [ { "status": "affected", "version": "20.8.0" } ] }, { "cpes": [ "cpe:2.3:a:asterisk:asterisk:18.23.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "asterisk", "vendor": "asterisk", "versions": [ { "status": "affected", "version": "18.23.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-35190", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-17T19:33:53.154042Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-24T15:28:38.260Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:07:46.821Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-qqxj-v78h-hrf9", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-qqxj-v78h-hrf9" }, { "name": "https://github.com/asterisk/asterisk/pull/600", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/asterisk/asterisk/pull/600" }, { "name": "https://github.com/asterisk/asterisk/pull/602", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/asterisk/asterisk/pull/602" }, { "name": "https://github.com/asterisk/asterisk/commit/85241bd22936cc15760fd1f65d16c98be7aeaf6d", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/asterisk/asterisk/commit/85241bd22936cc15760fd1f65d16c98be7aeaf6d" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "asterisk", "vendor": "asterisk", "versions": [ { "status": "affected", "version": "= 21.3.0" }, { "status": "affected", "version": "= 20.8.0" }, { "status": "affected", "version": "= 18.23.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Asterisk is an open source private branch exchange and telephony toolkit. After upgrade to 18.23.0, ALL unauthorized SIP requests are identified as PJSIP Endpoint of local asterisk server. This vulnerability is fixed in 18.23.1, 20.8.1, and 21.3.1.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-303", "description": "CWE-303: Incorrect Implementation of Authentication Algorithm", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-480", "description": "CWE-480: Use of Incorrect Operator", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-670", "description": "CWE-670: Always-Incorrect Control Flow Implementation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-17T16:55:41.346Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-qqxj-v78h-hrf9", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-qqxj-v78h-hrf9" }, { "name": "https://github.com/asterisk/asterisk/pull/600", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/pull/600" }, { "name": "https://github.com/asterisk/asterisk/pull/602", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/pull/602" }, { "name": "https://github.com/asterisk/asterisk/commit/85241bd22936cc15760fd1f65d16c98be7aeaf6d", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/commit/85241bd22936cc15760fd1f65d16c98be7aeaf6d" } ], "source": { "advisory": "GHSA-qqxj-v78h-hrf9", "discovery": "UNKNOWN" }, "title": "Asterisk\u0027 res_pjsip_endpoint_identifier_ip: wrongly matches ALL unauthorized SIP requests" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-35190", "datePublished": "2024-05-17T16:55:41.346Z", "dateReserved": "2024-05-10T14:24:24.341Z", "dateUpdated": "2024-08-02T03:07:46.821Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-1561
Vulnerability from cvelistv5
Published
2007-03-21 19:00
Modified
2024-08-07 12:59
Severity ?
EPSS score ?
Summary
The channel driver in Asterisk before 1.2.17 and 1.4.x before 1.4.2 allows remote attackers to cause a denial of service (crash) via a SIP INVITE message with an SDP containing one valid and one invalid IP address.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:59:08.721Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1017794", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1017794" }, { "name": "20070319 Asterisk SDP DOS vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://marc.info/?l=full-disclosure\u0026m=117432783011737\u0026w=2" }, { "name": "24564", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24564" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://asterisk.org/node/48339" }, { "name": "SUSE-SA:2007:034", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "20070321 Two new DoS Vulnerabilities in Asterisk Fixed", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/463434/100/0/threaded" }, { "name": "23031", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/23031" }, { "name": "asterisk-sip-invite-dos(33068)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33068" }, { "name": "GLSA-200704-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200704-01.xml" }, { "name": "25582", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25582" }, { "name": "24719", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24719" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sineapps.com/news.php?rssid=1707" }, { "name": "ADV-2007-1039", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1039" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "34479", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/34479" }, { "name": "[VOIPSEC] 20070319 Asterisk SDP DOS vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-03-19T00:00:00", "descriptions": [ { "lang": "en", "value": "The channel driver in Asterisk before 1.2.17 and 1.4.x before 1.4.2 allows remote attackers to cause a denial of service (crash) via a SIP INVITE message with an SDP containing one valid and one invalid IP address." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1017794", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1017794" }, { "name": "20070319 Asterisk SDP DOS vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://marc.info/?l=full-disclosure\u0026m=117432783011737\u0026w=2" }, { "name": "24564", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24564" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://asterisk.org/node/48339" }, { "name": "SUSE-SA:2007:034", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "20070321 Two new DoS Vulnerabilities in Asterisk Fixed", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/463434/100/0/threaded" }, { "name": "23031", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/23031" }, { "name": "asterisk-sip-invite-dos(33068)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33068" }, { "name": "GLSA-200704-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200704-01.xml" }, { "name": "25582", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25582" }, { "name": "24719", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24719" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sineapps.com/news.php?rssid=1707" }, { "name": "ADV-2007-1039", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1039" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "34479", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/34479" }, { "name": "[VOIPSEC] 20070319 Asterisk SDP DOS vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-1561", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The channel driver in Asterisk before 1.2.17 and 1.4.x before 1.4.2 allows remote attackers to cause a denial of service (crash) via a SIP INVITE message with an SDP containing one valid and one invalid IP address." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1017794", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1017794" }, { "name": "20070319 Asterisk SDP DOS vulnerability", "refsource": "FULLDISC", "url": "http://marc.info/?l=full-disclosure\u0026m=117432783011737\u0026w=2" }, { "name": "24564", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24564" }, { "name": "http://asterisk.org/node/48339", "refsource": "CONFIRM", "url": "http://asterisk.org/node/48339" }, { "name": "SUSE-SA:2007:034", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "20070321 Two new DoS Vulnerabilities in Asterisk Fixed", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/463434/100/0/threaded" }, { "name": "23031", "refsource": "BID", "url": "http://www.securityfocus.com/bid/23031" }, { "name": "asterisk-sip-invite-dos(33068)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33068" }, { "name": "GLSA-200704-01", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200704-01.xml" }, { "name": "25582", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25582" }, { "name": "24719", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24719" }, { "name": "http://www.sineapps.com/news.php?rssid=1707", "refsource": "CONFIRM", "url": "http://www.sineapps.com/news.php?rssid=1707" }, { "name": "ADV-2007-1039", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1039" }, { "name": "DSA-1358", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "34479", "refsource": "OSVDB", "url": "http://www.osvdb.org/34479" }, { "name": "[VOIPSEC] 20070319 Asterisk SDP DOS vulnerability", "refsource": "MLIST", "url": "http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-1561", "datePublished": "2007-03-21T19:00:00", "dateReserved": "2007-03-21T00:00:00", "dateUpdated": "2024-08-07T12:59:08.721Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-3762
Vulnerability from cvelistv5
Published
2007-07-18 17:00
Modified
2024-08-07 14:28
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in the IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to execute arbitrary code by sending a long (1) voice or (2) video RTP frame.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/35466 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/26099 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id?1018407 | vdb-entry, x_refsource_SECTRACK | |
http://security.gentoo.org/glsa/glsa-200802-11.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/29051 | third-party-advisory, x_refsource_SECUNIA | |
http://bugs.gentoo.org/show_bug.cgi?id=185713 | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2007/2563 | vdb-entry, x_refsource_VUPEN | |
http://www.debian.org/security/2007/dsa-1358 | vendor-advisory, x_refsource_DEBIAN | |
http://www.novell.com/linux/security/advisories/2007_15_sr.html | vendor-advisory, x_refsource_SUSE | |
http://ftp.digium.com/pub/asa/ASA-2007-014.pdf | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/24949 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:28:52.292Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "asterisk-iax2channeldriver-bo(35466)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35466" }, { "name": "26099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26099" }, { "name": "1018407", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018407" }, { "name": "GLSA-200802-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "name": "29051", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29051" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "name": "ADV-2007-2563", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "SUSE-SR:2007:015", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-014.pdf" }, { "name": "24949", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24949" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to execute arbitrary code by sending a long (1) voice or (2) video RTP frame." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "asterisk-iax2channeldriver-bo(35466)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35466" }, { "name": "26099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26099" }, { "name": "1018407", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018407" }, { "name": "GLSA-200802-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "name": "29051", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29051" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "name": "ADV-2007-2563", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "SUSE-SR:2007:015", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-014.pdf" }, { "name": "24949", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24949" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3762", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to execute arbitrary code by sending a long (1) voice or (2) video RTP frame." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "asterisk-iax2channeldriver-bo(35466)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35466" }, { "name": "26099", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26099" }, { "name": "1018407", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018407" }, { "name": "GLSA-200802-11", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "name": "29051", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29051" }, { "name": "http://bugs.gentoo.org/show_bug.cgi?id=185713", "refsource": "CONFIRM", "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "name": "ADV-2007-2563", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "name": "DSA-1358", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "SUSE-SR:2007:015", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" }, { "name": "http://ftp.digium.com/pub/asa/ASA-2007-014.pdf", "refsource": "CONFIRM", "url": "http://ftp.digium.com/pub/asa/ASA-2007-014.pdf" }, { "name": "24949", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24949" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3762", "datePublished": "2007-07-18T17:00:00", "dateReserved": "2007-07-13T00:00:00", "dateUpdated": "2024-08-07T14:28:52.292Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-3723
Vulnerability from cvelistv5
Published
2019-10-29 12:42
Modified
2024-08-07 06:38
Severity ?
EPSS score ?
Summary
asterisk allows calls on prohibited networks
References
▼ | URL | Tags |
---|---|---|
https://security-tracker.debian.org/tracker/CVE-2009-3723 | x_refsource_MISC | |
https://access.redhat.com/security/cve/cve-2009-3723 | x_refsource_MISC | |
http://downloads.asterisk.org/pub/security/AST-2009-007.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:38:30.400Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2009-3723" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://access.redhat.com/security/cve/cve-2009-3723" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://downloads.asterisk.org/pub/security/AST-2009-007.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "asterisk", "vendor": "asterisk", "versions": [ { "status": "affected", "version": "All 1.6.1 versions" } ] } ], "descriptions": [ { "lang": "en", "value": "asterisk allows calls on prohibited networks" } ], "problemTypes": [ { "descriptions": [ { "description": "calls allowed on prohibited networks in asterisk", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-29T12:42:08", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2009-3723" }, { "tags": [ "x_refsource_MISC" ], "url": "https://access.redhat.com/security/cve/cve-2009-3723" }, { "tags": [ "x_refsource_MISC" ], "url": "http://downloads.asterisk.org/pub/security/AST-2009-007.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2009-3723", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "asterisk", "version": { "version_data": [ { "version_value": "All 1.6.1 versions" } ] } } ] }, "vendor_name": "asterisk" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "asterisk allows calls on prohibited networks" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "calls allowed on prohibited networks in asterisk" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-tracker.debian.org/tracker/CVE-2009-3723", "refsource": "MISC", "url": "https://security-tracker.debian.org/tracker/CVE-2009-3723" }, { "name": "https://access.redhat.com/security/cve/cve-2009-3723", "refsource": "MISC", "url": "https://access.redhat.com/security/cve/cve-2009-3723" }, { "name": "http://downloads.asterisk.org/pub/security/AST-2009-007.html", "refsource": "MISC", "url": "http://downloads.asterisk.org/pub/security/AST-2009-007.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2009-3723", "datePublished": "2019-10-29T12:42:08", "dateReserved": "2009-10-16T00:00:00", "dateUpdated": "2024-08-07T06:38:30.400Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }