Search criteria
39 vulnerabilities found for asterisknow by asterisk
FKIE_CVE-2008-3264
Vulnerability from fkie_nvd - Published: 2008-07-24 15:41 - Updated: 2025-04-09 00:30
Severity ?
Summary
The FWDOWNL firmware-download implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (traffic amplification) via an IAX2 FWDOWNL request.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9282AC42-E98A-4BC2-B46D-15B5776C961F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "83DBFD69-2500-46C1-827C-1493CF896F49",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F53C8D19-507A-45B6-9B19-C733460F0739",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "09AEF231-3438-420E-B2B0-1B876A929033",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1C05B437-C292-4AA0-8AFE-1CA07CD80034",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0102C4C0-1A7D-4AB7-9817-44E6B0DB761E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "81DDF486-4185-48EE-869E-0AA6726C31F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "CF45A8E1-F6B1-42BD-9168-12062FA6EAEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C5757B9B-2759-439A-9A6D-CCDD6C8C8940",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E4548D39-0562-4946-AA51-A7C1A31AEE8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FCD71268-EAA2-477B-8AC4-DE4853A262B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "529B2115-A191-4F3F-8F8C-A38B7C45463A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:a:*:*:*:*:*:*:*",
"matchCriteriaId": "313B3A38-8DEA-4D62-A1A4-0B6011E81870",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b:*:*:*:*:*:*:*",
"matchCriteriaId": "B24F3283-4809-40B1-8166-9D1C3A4C9104",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "802F8680-AB38-41AF-BFC8-F6927F6B1626",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BCAE8D90-B032-4C60-B487-BE655D00FFAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AB64A872-B7B8-46A8-81E4-49EDAC160531",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "21000270-C9B9-430C-A252-763887A15835",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "12F7CF45-5482-4947-8F1D-48C746987475",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7B64995D-7892-49AB-A89D-A5D15615C5D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0397DBD4-EA00-444A-9008-4932F99DF325",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6FCD865F-BC39-4255-A797-6E5945773337",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D7203093-7209-4184-92CB-08AD73FAC379",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E4956871-4DD3-4299-8BEB-9D98A4449A42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0F04F844-79C4-41F3-9671-8B46460D0AAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8936B494-E647-498B-8380-AE4DAD458533",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b2.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1B234F33-5233-42A3-B95A-3A3558B4DDCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c:*:*:*:*:*:*:*",
"matchCriteriaId": "4D47534E-8EBC-44B5-8770-65BBA7C3F3DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta7:*:*:*:*:*:*:*",
"matchCriteriaId": "5BC80EBD-14D3-44A6-A06F-0549722E0EFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta8:*:*:*:*:*:*:*",
"matchCriteriaId": "7859797F-E9AD-4429-BD2C-A24EC24A5D03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E5C988FD-CFB9-4763-BE5A-B89FB3538FD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "00A6DAD0-D4C3-4A58-A35A-991E04B50EC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6413B123-65DE-4483-A8A0-F5F30A809570",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c1.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "502AEBA1-2A6D-4367-86AB-F2948207FCA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c1.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "93DA4919-A365-48B6-84D6-6A7D97941A13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:*",
"matchCriteriaId": "B12A09BE-1EE0-46D5-B3F0-E8847409A49A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:*",
"matchCriteriaId": "7A5A734E-1DD3-4924-8AC1-97048FA3270F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisknow:beta_7:*:*:*:*:*:*:*",
"matchCriteriaId": "3AE2F09E-4B5A-4EDF-A48A-BCBBAA80156B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisknow:pre-release:*:*:*:*:*:*:*",
"matchCriteriaId": "F420EB4D-5B9C-4BBA-AAC5-5E0E83CD1F74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "678DB154-4363-42FF-8B28-367923FC6595",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E8F2C378-FF0E-4765-9F66-625C4064D5CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A55A9295-F632-4856-90A1-38371EB98589",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7FAE6AF1-884D-41F7-B174-9E13C7719C99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DCA9E35B-9A6B-42F2-9315-9C7D09F62227",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "89B1F293-4F0F-48FD-A1F1-1230B94D87D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DDF7EC20-A424-45E5-B7E4-3CC86075858C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C790E105-55C8-4CDC-9FA8-E1FF6F130A67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "44C860EF-2B29-4995-B942-000CC43FDD14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1ADB80EF-C724-44BA-88FC-24087799D0C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "78B39BE8-7E2D-42DF-8633-44CAD5662777",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F39036E3-0027-4C72-9DEB-9A6E2B4512C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A037E6F9-3EF7-4EEB-AC16-081421BCE40D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6A7EC02A-9C9E-4589-BBB3-1908D3078A7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "6C70FA9C-6F3B-4BDF-97FB-81D06AB0EE65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9F7971E1-F136-4ADC-95EC-BC4F92E838CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.0beta1:*:*:*:*:*:*:*",
"matchCriteriaId": "7435F043-F92B-4635-93CC-A2C39AAE1BCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.0beta2:*:*:*:*:*:*:*",
"matchCriteriaId": "C7B2F43B-8B69-4BF6-86B7-A225175FF068",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "27202966-2C41-4964-9497-1887D2A834C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1471B5A2-15BE-4E7C-BA49-2E6002F7C8EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7108D72F-5AFD-4EEF-B2A9-CA4FA792E193",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "107DA2D8-FE7C-4B70-856D-43D58B988694",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "ABD71DD9-8A15-45E2-9FB3-F0544D7E1B80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5C14614F-4E27-40A6-9E56-2B1DBB10330B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7A2F2F5A-66FD-4057-917C-66332A88D83E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "399B0206-B48B-46EF-8CA6-A6E5A2550B25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "26E9760F-C0EB-47BB-8DA4-CC7815099DAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "4C510A9A-C3E2-4AF8-9919-1A22E918CDEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6BD915CD-A7D3-4305-A6C0-290C648A226C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "9E79CCE5-C29B-4726-8D2F-BC20F70959BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "F29C13DB-6F04-4B41-90A2-2408D70F3641",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "0F4F734E-0E78-4957-B323-8E9FBA7FF15C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1A4B117B-E945-4033-A79D-10DFAA3DF18B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "EA6D866F-8189-4FFD-AA24-47C0A015C246",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "A4EBFB79-C269-4132-BFAB-451F66CE8289",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "E9E1028E-2C07-4BA3-B891-FA853A87B280",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9E74F577-70BD-4FAF-BCFD-10CD21FC5601",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "57BB03E2-E61C-4A94-82DF-8720698CE271",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "1B30A36F-5CE6-4246-8752-176FB5999C1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "E0F76DFD-4DAC-4B02-8967-B242CDEEF6C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "6A59BC20-3217-4584-9196-D1CD9E0D6B52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "56F728BA-FC9E-4EEE-9A08-C9C7433BD8D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3C64DF29-5B3D-401E-885E-8E37FD577254",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "1A7BF52A-2FF8-40ED-B757-28A1101DE8F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "7A321C2D-852B-4498-ADD6-79956410AB94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:*",
"matchCriteriaId": "9D5F0DCF-C6A2-4A09-90C9-D70F174FDEF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:*",
"matchCriteriaId": "C820538E-14EC-43C1-80DB-6AAE4905EF0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.26:*:*:*:*:*:*:*",
"matchCriteriaId": "E9562112-2505-4F78-86DE-F30EFAEE47D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1A6D8FD0-C8C1-4868-9AF1-96B1949C18AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:*",
"matchCriteriaId": "72A840B4-216B-4063-997F-791FBC8C8658",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.27:*:*:*:*:*:*:*",
"matchCriteriaId": "BE47A547-26E7-48F9-B0A6-2F65E04A1EDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.28:*:*:*:*:*:*:*",
"matchCriteriaId": "E1AEB744-FCF2-4A41-8866-9D1D20E6C6B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.29:*:*:*:*:*:*:*",
"matchCriteriaId": "51E5EB34-30AD-4E81-8BD4-4AB905E52B82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "967DF432-DEF4-4FA2-8C8D-19A7FB663A33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "295D4042-2D3C-481B-B969-2DDAC1161198",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "99E9EE2A-56AD-42BC-8CB0-D34091849B0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "96877A3E-B54B-4F31-B281-76CDC98B2D02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6D0B4503-42A6-4D88-954E-A662E91EC204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A4B73813-BCD8-429E-B9B9-D6665E026BC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5BBA3ECC-4F40-41CD-A6D7-BBD680DDBACC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9CBE2156-AF86-4C72-B33D-3FF83930F828",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "61408884-FBBF-4D94-A552-F99AB46DCED6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "4A527277-D97D-4B74-906F-7481BDBD96D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "D8B57A32-7B83-4783-A244-C26301970444",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "044FD0D0-FC92-4A01-B0D4-11A703EF21FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3477EC1A-9634-492C-B052-35770A9C9F4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "1C90F104-FA2C-4091-B149-1774AC982C0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "C9328768-7C08-4143-B5F8-F5C2D735D21A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6C04E2B3-094B-4828-A2FC-BB66244A9F73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDE3D31-4BB2-45A3-B085-8C91152A3152",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.14:*:*:*:*:*:*:*",
"matchCriteriaId": "CE0107D4-395E-45F1-B963-7618CCC007D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.15:*:*:*:*:*:*:*",
"matchCriteriaId": "53B8E11B-4984-45A8-A107-D276205988B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.16:*:*:*:*:*:*:*",
"matchCriteriaId": "2495DB98-F923-4E60-86EC-2DBB7A98C90C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E186D125-996E-4900-A2B8-5CDC8B5D5136",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.2:*:*:*:*:*:*:*",
"matchCriteriaId": "27DC6CF7-4DF8-4472-A684-8CCB5E26FCFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.17:*:*:*:*:*:*:*",
"matchCriteriaId": "88576385-EF03-408B-9775-B52E6AFFE48A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.18:*:*:*:*:*:*:*",
"matchCriteriaId": "1A838577-2BA1-4792-8B69-6FB07FFD7727",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CDEED3E1-13E0-46E6-8AAB-D24D2D04AE4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:*:*:*:*:*:*:*",
"matchCriteriaId": "ED2BF36F-CF10-4F24-970B-3D0BB7561C81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.19.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FB1593E1-BF21-4DB9-A18E-9F221F3F9022",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.19_rc3:*:*:*:*:*:*:*",
"matchCriteriaId": "2D41604A-21CB-4EF3-85E8-8CD170C8013F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4_revision_95946:*:*:*:*:*:*:*",
"matchCriteriaId": "E3C6272B-D0C4-4EA5-AEE4-5A45DAA2DDE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4beta:*:*:*:*:*:*:*",
"matchCriteriaId": "2A8012CE-4D4B-4131-87E7-16D7907E3BB3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The FWDOWNL firmware-download implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (traffic amplification) via an IAX2 FWDOWNL request."
},
{
"lang": "es",
"value": "La implementaci\u00f3n FWDOWNL firmware-download en Asterisk Open Source 1.0.x, 1.2.x antes de 1.2.30 y 1.4.x antes de 1.4.21.2; Business Edition A.x.x, B.x.x antes de B.2.5.4 y C.x.x antes de C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; y s800i 1.0.x antes de 1.2.0.1 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (amplificaci\u00f3n del tr\u00e1fico) mediante una petici\u00f3n IAX2 FWDOWNL."
}
],
"id": "CVE-2008-3264",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2008-07-24T15:41:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://downloads.digium.com/pub/security/AST-2008-011.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31178"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/31194"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/34982"
},
{
"source": "cve@mitre.org",
"url": "http://security.gentoo.org/glsa/glsa-200905-01.xml"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/494676/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/30350"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1020536"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2008/2168/references"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43955"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://downloads.digium.com/pub/security/AST-2008-011.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31178"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/31194"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/34982"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200905-01.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/494676/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/30350"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1020536"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/2168/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43955"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2008-1923
Vulnerability from fkie_nvd - Published: 2008-04-23 16:05 - Updated: 2025-04-09 00:30
Severity ?
Summary
The IAX2 channel driver (chan_iax2) in Asterisk 1.2 before revision 72630 and 1.4 before revision 65679, when configured to allow unauthenticated calls, sends "early audio" to an unverified source IP address of a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed NEW message.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2140AF01-7079-4433-AF28-45E767E59AD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C58BA442-8E36-492B-9700-B20B469190F4",
"versionEndIncluding": "b2.5.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*",
"matchCriteriaId": "267F32ED-B9E4-4454-99C1-F445E52EE96F",
"versionEndIncluding": "c1.8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:a:*:*:*:*:*:*:*",
"matchCriteriaId": "313B3A38-8DEA-4D62-A1A4-0B6011E81870",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "802F8680-AB38-41AF-BFC8-F6927F6B1626",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BCAE8D90-B032-4C60-B487-BE655D00FFAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AB64A872-B7B8-46A8-81E4-49EDAC160531",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "21000270-C9B9-430C-A252-763887A15835",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "12F7CF45-5482-4947-8F1D-48C746987475",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7B64995D-7892-49AB-A89D-A5D15615C5D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0397DBD4-EA00-444A-9008-4932F99DF325",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6FCD865F-BC39-4255-A797-6E5945773337",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E4956871-4DD3-4299-8BEB-9D98A4449A42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta7:*:*:*:*:*:*:*",
"matchCriteriaId": "5BC80EBD-14D3-44A6-A06F-0549722E0EFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta8:*:*:*:*:*:*:*",
"matchCriteriaId": "7859797F-E9AD-4429-BD2C-A24EC24A5D03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0beta7:*:*:*:*:*:*:*",
"matchCriteriaId": "34FAE6AC-1C98-42E0-A5D4-5EA17ED325A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "00A6DAD0-D4C3-4A58-A35A-991E04B50EC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisknow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "272DE03B-1470-45FF-A31B-2CE44A8E8378",
"versionEndIncluding": "1.0.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisknow:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CC6FE17C-3B08-4675-9F73-5DC0C2438BB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisknow:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0D8AB81C-3DCF-42E9-8022-2F7135022C73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "678DB154-4363-42FF-8B28-367923FC6595",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E8F2C378-FF0E-4765-9F66-625C4064D5CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A55A9295-F632-4856-90A1-38371EB98589",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7FAE6AF1-884D-41F7-B174-9E13C7719C99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DCA9E35B-9A6B-42F2-9315-9C7D09F62227",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DDF7EC20-A424-45E5-B7E4-3CC86075858C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C790E105-55C8-4CDC-9FA8-E1FF6F130A67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "44C860EF-2B29-4995-B942-000CC43FDD14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1ADB80EF-C724-44BA-88FC-24087799D0C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "78B39BE8-7E2D-42DF-8633-44CAD5662777",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F39036E3-0027-4C72-9DEB-9A6E2B4512C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A037E6F9-3EF7-4EEB-AC16-081421BCE40D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6A7EC02A-9C9E-4589-BBB3-1908D3078A7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "6C70FA9C-6F3B-4BDF-97FB-81D06AB0EE65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9F7971E1-F136-4ADC-95EC-BC4F92E838CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "27202966-2C41-4964-9497-1887D2A834C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1471B5A2-15BE-4E7C-BA49-2E6002F7C8EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7108D72F-5AFD-4EEF-B2A9-CA4FA792E193",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.3:netsec:*:*:*:*:*:*",
"matchCriteriaId": "DC7EB4CD-6436-4E0B-A620-9DF2AC8A3C66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "107DA2D8-FE7C-4B70-856D-43D58B988694",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.4:netsec:*:*:*:*:*:*",
"matchCriteriaId": "02D5E6DF-7C9C-479F-986B-D5C8A144ACB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "ABD71DD9-8A15-45E2-9FB3-F0544D7E1B80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.5:netsec:*:*:*:*:*:*",
"matchCriteriaId": "68AF6200-1385-449F-A00E-2BACEE16450B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5C14614F-4E27-40A6-9E56-2B1DBB10330B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.6:netsec:*:*:*:*:*:*",
"matchCriteriaId": "61C0769F-6739-41D2-ADD8-924AC04C5F28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7A2F2F5A-66FD-4057-917C-66332A88D83E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.7:netsec:*:*:*:*:*:*",
"matchCriteriaId": "8EF13987-5767-4FED-9584-63D74B0A30A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "399B0206-B48B-46EF-8CA6-A6E5A2550B25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.7.1:netsec:*:*:*:*:*:*",
"matchCriteriaId": "C57C1324-E11A-4B2B-9722-A4A63AEF0497",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "26E9760F-C0EB-47BB-8DA4-CC7815099DAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.8:netsec:*:*:*:*:*:*",
"matchCriteriaId": "EE6D9718-D57D-48F6-A2B1-CECAFFCDDFB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "4C510A9A-C3E2-4AF8-9919-1A22E918CDEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6BD915CD-A7D3-4305-A6C0-290C648A226C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.9.1:netsec:*:*:*:*:*:*",
"matchCriteriaId": "3249AB40-2058-42E9-9A33-64E434E5BB64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "9E79CCE5-C29B-4726-8D2F-BC20F70959BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.10:netsec:*:*:*:*:*:*",
"matchCriteriaId": "0CF6584D-A7BB-4BD5-8232-9293FEE4A971",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "F29C13DB-6F04-4B41-90A2-2408D70F3641",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.11:netsec:*:*:*:*:*:*",
"matchCriteriaId": "174D6B56-7D0F-46F0-849A-FD05CB348FAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "0F4F734E-0E78-4957-B323-8E9FBA7FF15C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.12:netsec:*:*:*:*:*:*",
"matchCriteriaId": "938F545A-F8A7-455E-8E5A-2B5454B6CE53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1A4B117B-E945-4033-A79D-10DFAA3DF18B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "EA6D866F-8189-4FFD-AA24-47C0A015C246",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.13:netsec:*:*:*:*:*:*",
"matchCriteriaId": "B2BAA1B3-7DD3-4248-915D-2BCC0ACFA2C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "A4EBFB79-C269-4132-BFAB-451F66CE8289",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.14:netsec:*:*:*:*:*:*",
"matchCriteriaId": "21612C17-7368-4108-B55B-5AB5CA6733E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "E9E1028E-2C07-4BA3-B891-FA853A87B280",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.15:netsec:*:*:*:*:*:*",
"matchCriteriaId": "8A0D57D7-15AD-4CDF-A5A7-AB83F8E6154E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9E74F577-70BD-4FAF-BCFD-10CD21FC5601",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.16:netsec:*:*:*:*:*:*",
"matchCriteriaId": "06DB25C8-4EA5-465F-8EFA-BCA8D40F1795",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "57BB03E2-E61C-4A94-82DF-8720698CE271",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.17:netsec:*:*:*:*:*:*",
"matchCriteriaId": "A149F8C2-3DA5-44B2-A288-3482F3975824",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "1B30A36F-5CE6-4246-8752-176FB5999C1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.18:netsec:*:*:*:*:*:*",
"matchCriteriaId": "9462B320-B69D-409D-8DCC-D8D6CA1A757D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "E0F76DFD-4DAC-4B02-8967-B242CDEEF6C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.19:netsec:*:*:*:*:*:*",
"matchCriteriaId": "ECCCBAE9-8FD4-43F0-9EF8-56E9BBA3D8C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "6A59BC20-3217-4584-9196-D1CD9E0D6B52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.20:netsec:*:*:*:*:*:*",
"matchCriteriaId": "BEA0014A-659B-4533-A393-6D4ADC80EB0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "56F728BA-FC9E-4EEE-9A08-C9C7433BD8D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.21:netsec:*:*:*:*:*:*",
"matchCriteriaId": "8F1621F9-7C84-4CF0-BBCD-CEAEE8683BAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3C64DF29-5B3D-401E-885E-8E37FD577254",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.21.1:netsec:*:*:*:*:*:*",
"matchCriteriaId": "346C9F65-B5FB-4A75-8E1B-137112F270D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "1A7BF52A-2FF8-40ED-B757-28A1101DE8F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.22:netsec:*:*:*:*:*:*",
"matchCriteriaId": "7EFEE380-0C64-4413-AF3A-45ABC8833500",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "7A321C2D-852B-4498-ADD6-79956410AB94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.23:netsec:*:*:*:*:*:*",
"matchCriteriaId": "8CA18FC6-1480-400E-A885-8CDAE45AA7A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:*",
"matchCriteriaId": "9D5F0DCF-C6A2-4A09-90C9-D70F174FDEF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.24:netsec:*:*:*:*:*:*",
"matchCriteriaId": "93741261-378B-4C02-8D68-0E5F39128375",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:*",
"matchCriteriaId": "C820538E-14EC-43C1-80DB-6AAE4905EF0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.25:netsec:*:*:*:*:*:*",
"matchCriteriaId": "07CF9DD6-B624-49F0-A8E4-7EBCE7932BEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.26:*:*:*:*:*:*:*",
"matchCriteriaId": "E9562112-2505-4F78-86DE-F30EFAEE47D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.26:netsec:*:*:*:*:*:*",
"matchCriteriaId": "9EEA1E9C-C1FB-4EFD-86EA-DCF78C57FC35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1A6D8FD0-C8C1-4868-9AF1-96B1949C18AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.1:netsec:*:*:*:*:*:*",
"matchCriteriaId": "5E20FAF7-9031-478E-A89C-D6FB3B5FDE3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:*",
"matchCriteriaId": "72A840B4-216B-4063-997F-791FBC8C8658",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.2:netsec:*:*:*:*:*:*",
"matchCriteriaId": "72375576-F857-4585-A677-A326D89A65B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.27:*:*:*:*:*:*:*",
"matchCriteriaId": "BE47A547-26E7-48F9-B0A6-2F65E04A1EDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.28:*:*:*:*:*:*:*",
"matchCriteriaId": "E1AEB744-FCF2-4A41-8866-9D1D20E6C6B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "967DF432-DEF4-4FA2-8C8D-19A7FB663A33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "40850BF4-E252-4667-9B46-9B6FEF6E997D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "1BB01DD1-B29B-4210-88CC-9ADB3148A410",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "5C0FA6A3-BFA9-4397-B75B-75C8357C36B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "295D4042-2D3C-481B-B969-2DDAC1161198",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "99E9EE2A-56AD-42BC-8CB0-D34091849B0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "96877A3E-B54B-4F31-B281-76CDC98B2D02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6D0B4503-42A6-4D88-954E-A662E91EC204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A4B73813-BCD8-429E-B9B9-D6665E026BC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5BBA3ECC-4F40-41CD-A6D7-BBD680DDBACC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9CBE2156-AF86-4C72-B33D-3FF83930F828",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "61408884-FBBF-4D94-A552-F99AB46DCED6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "4A527277-D97D-4B74-906F-7481BDBD96D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "D8B57A32-7B83-4783-A244-C26301970444",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "044FD0D0-FC92-4A01-B0D4-11A703EF21FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3477EC1A-9634-492C-B052-35770A9C9F4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "1C90F104-FA2C-4091-B149-1774AC982C0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "C9328768-7C08-4143-B5F8-F5C2D735D21A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6C04E2B3-094B-4828-A2FC-BB66244A9F73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDE3D31-4BB2-45A3-B085-8C91152A3152",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.14:*:*:*:*:*:*:*",
"matchCriteriaId": "CE0107D4-395E-45F1-B963-7618CCC007D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.15:*:*:*:*:*:*:*",
"matchCriteriaId": "53B8E11B-4984-45A8-A107-D276205988B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.16:*:*:*:*:*:*:*",
"matchCriteriaId": "2495DB98-F923-4E60-86EC-2DBB7A98C90C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E186D125-996E-4900-A2B8-5CDC8B5D5136",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.2:*:*:*:*:*:*:*",
"matchCriteriaId": "27DC6CF7-4DF8-4472-A684-8CCB5E26FCFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.17:*:*:*:*:*:*:*",
"matchCriteriaId": "88576385-EF03-408B-9775-B52E6AFFE48A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.18:*:*:*:*:*:*:*",
"matchCriteriaId": "1A838577-2BA1-4792-8B69-6FB07FFD7727",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CDEED3E1-13E0-46E6-8AAB-D24D2D04AE4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "BFC1BB05-15C6-4829-86EB-5B1BFA4B5B17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc2:*:*:*:*:*:*",
"matchCriteriaId": "AB77E88B-7233-4979-914E-24E671C1FB23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "C4FF0F09-0268-480F-A2F3-6F8C3F323EEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc4:*:*:*:*:*:*",
"matchCriteriaId": "1CCF9CAE-674A-4833-9D5C-FCBD865BE9F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:s800i:*:*:*:*:*:*:*:*",
"matchCriteriaId": "15C01793-C5D3-4359-B332-A8A104832370",
"versionEndIncluding": "1.1.0.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:s800i:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0C3A0A08-4107-4B8B-AE7E-DC23849A54DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:s800i:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9320928D-D83C-4258-AF62-AB2D1F50D972",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:s800i:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "569084D1-977D-41FC-A444-0B3F5199DDD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:s800i:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "02D182FB-761C-4F08-A776-B613FAC55230",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:s800i:1.0.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C9046D49-6878-4571-8B9E-2FBD5BA80D19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:s800i:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A7B5EDAB-61DD-4864-A159-39292D339DA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:s800i:1.1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "101DFEFB-7627-4D36-AAA2-EDFB4D0E5AB5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The IAX2 channel driver (chan_iax2) in Asterisk 1.2 before revision 72630 and 1.4 before revision 65679, when configured to allow unauthenticated calls, sends \"early audio\" to an unverified source IP address of a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed NEW message."
},
{
"lang": "es",
"value": "El IAX2 channel driver (chan_iax2) en Asterisk 1.2 anterior a la revisi\u00f3n 72630 y 1.4 anterior a la revisi\u00f3n 65679, cuando est\u00e1 configurado para permitir llamadas sin autenticaci\u00f3n, env\u00eda \"early audio\" a una IP sin verificar de un mensaje NEW, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (amplificaci\u00f3n del tr\u00e1fico) a trav\u00e9s de un mensaje NEW falseado."
}
],
"id": "CVE-2008-1923",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2008-04-23T16:05:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://bugs.digium.com/view.php?id=10078"
},
{
"source": "cve@mitre.org",
"url": "http://downloads.digium.com/pub/security/AST-2008-006.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.altsci.com/concepts/page.php?s=asteri\u0026p=1"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42049"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://bugs.digium.com/view.php?id=10078"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://downloads.digium.com/pub/security/AST-2008-006.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.altsci.com/concepts/page.php?s=asteri\u0026p=1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42049"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-16"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2008-1897
Vulnerability from fkie_nvd - Published: 2008-04-23 16:05 - Updated: 2025-04-09 00:30
Severity ?
Summary
The IAX2 channel driver (chan_iax2) in Asterisk Open Source 1.0.x, 1.2.x before 1.2.28, and 1.4.x before 1.4.19.1; Business Edition A.x.x, B.x.x before B.2.5.2, and C.x.x before C.1.8.1; AsteriskNOW before 1.0.3; Appliance Developer Kit 0.x.x; and s800i before 1.1.0.3, when configured to allow unauthenticated calls, does not verify that an ACK response contains a call number matching the server's reply to a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed ACK response that does not complete a 3-way handshake. NOTE: this issue exists because of an incomplete fix for CVE-2008-1923.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1C05B437-C292-4AA0-8AFE-1CA07CD80034",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0102C4C0-1A7D-4AB7-9817-44E6B0DB761E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "81DDF486-4185-48EE-869E-0AA6726C31F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "CF45A8E1-F6B1-42BD-9168-12062FA6EAEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C5757B9B-2759-439A-9A6D-CCDD6C8C8940",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E4548D39-0562-4946-AA51-A7C1A31AEE8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FCD71268-EAA2-477B-8AC4-DE4853A262B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "529B2115-A191-4F3F-8F8C-A38B7C45463A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3097291D-BBBB-4C69-8909-D6F7AC622B5D",
"versionEndIncluding": "b.2.5.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*",
"matchCriteriaId": "267F32ED-B9E4-4454-99C1-F445E52EE96F",
"versionEndIncluding": "c1.8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:a:*:*:*:*:*:*:*",
"matchCriteriaId": "313B3A38-8DEA-4D62-A1A4-0B6011E81870",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "802F8680-AB38-41AF-BFC8-F6927F6B1626",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BCAE8D90-B032-4C60-B487-BE655D00FFAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AB64A872-B7B8-46A8-81E4-49EDAC160531",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "21000270-C9B9-430C-A252-763887A15835",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "12F7CF45-5482-4947-8F1D-48C746987475",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7B64995D-7892-49AB-A89D-A5D15615C5D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0397DBD4-EA00-444A-9008-4932F99DF325",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6FCD865F-BC39-4255-A797-6E5945773337",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D7203093-7209-4184-92CB-08AD73FAC379",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E4956871-4DD3-4299-8BEB-9D98A4449A42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0:beta7:*:*:*:*:*:*",
"matchCriteriaId": "F981A428-E7F3-4DE5-91DC-60A1C5C6C6EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0:beta8:*:*:*:*:*:*",
"matchCriteriaId": "AF94C93A-723D-4DC5-9342-F091C8C6FF7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E5C988FD-CFB9-4763-BE5A-B89FB3538FD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "00A6DAD0-D4C3-4A58-A35A-991E04B50EC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6413B123-65DE-4483-A8A0-F5F30A809570",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisknow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "272DE03B-1470-45FF-A31B-2CE44A8E8378",
"versionEndIncluding": "1.0.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisknow:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CC6FE17C-3B08-4675-9F73-5DC0C2438BB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisknow:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0D8AB81C-3DCF-42E9-8022-2F7135022C73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BB10847E-585B-492B-A174-4D1C14755E0E",
"versionEndIncluding": "1.2.27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6BD2F115-4614-4E25-8902-356EEC966E8E",
"versionEndIncluding": "1.4.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "678DB154-4363-42FF-8B28-367923FC6595",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "0B41BC83-3AE3-4C89-A682-E24A4EFF9605",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "98F2FE25-8CDA-4D6D-884B-82C4D90F7FED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E8F2C378-FF0E-4765-9F66-625C4064D5CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A55A9295-F632-4856-90A1-38371EB98589",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7FAE6AF1-884D-41F7-B174-9E13C7719C99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DCA9E35B-9A6B-42F2-9315-9C7D09F62227",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "89B1F293-4F0F-48FD-A1F1-1230B94D87D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DDF7EC20-A424-45E5-B7E4-3CC86075858C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C790E105-55C8-4CDC-9FA8-E1FF6F130A67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "44C860EF-2B29-4995-B942-000CC43FDD14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1ADB80EF-C724-44BA-88FC-24087799D0C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "78B39BE8-7E2D-42DF-8633-44CAD5662777",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F39036E3-0027-4C72-9DEB-9A6E2B4512C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A037E6F9-3EF7-4EEB-AC16-081421BCE40D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.11:patch:*:*:*:*:*:*",
"matchCriteriaId": "A553D442-A573-4A60-8514-3C70F651756D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6A7EC02A-9C9E-4589-BBB3-1908D3078A7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.11.1:patch:*:*:*:*:*:*",
"matchCriteriaId": "2395C742-D9FE-466F-BC97-67A846539121",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "6C70FA9C-6F3B-4BDF-97FB-81D06AB0EE65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.12:patch:*:*:*:*:*:*",
"matchCriteriaId": "58487C69-86C0-4736-BC90-4292AF8E3DB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9F7971E1-F136-4ADC-95EC-BC4F92E838CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "E62D108C-862D-4BDB-BE37-285AA4C9C59A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "CF1422F3-829D-498C-83A6-02989DFB70A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "CBEB9D69-A404-4053-92F9-CAC3481AFF1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "E816CCDB-4169-4F09-AE87-E467F4BE7685",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "27202966-2C41-4964-9497-1887D2A834C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1471B5A2-15BE-4E7C-BA49-2E6002F7C8EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.2:netsec:*:*:*:*:*:*",
"matchCriteriaId": "65223182-1675-462C-AF67-4A48760A63F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7108D72F-5AFD-4EEF-B2A9-CA4FA792E193",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.3:netsec:*:*:*:*:*:*",
"matchCriteriaId": "DC7EB4CD-6436-4E0B-A620-9DF2AC8A3C66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "107DA2D8-FE7C-4B70-856D-43D58B988694",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.4:netsec:*:*:*:*:*:*",
"matchCriteriaId": "02D5E6DF-7C9C-479F-986B-D5C8A144ACB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "ABD71DD9-8A15-45E2-9FB3-F0544D7E1B80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.5:netsec:*:*:*:*:*:*",
"matchCriteriaId": "68AF6200-1385-449F-A00E-2BACEE16450B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5C14614F-4E27-40A6-9E56-2B1DBB10330B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.6:netsec:*:*:*:*:*:*",
"matchCriteriaId": "61C0769F-6739-41D2-ADD8-924AC04C5F28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7A2F2F5A-66FD-4057-917C-66332A88D83E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.7:netsec:*:*:*:*:*:*",
"matchCriteriaId": "8EF13987-5767-4FED-9584-63D74B0A30A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "399B0206-B48B-46EF-8CA6-A6E5A2550B25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.7.1:netsec:*:*:*:*:*:*",
"matchCriteriaId": "C57C1324-E11A-4B2B-9722-A4A63AEF0497",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "26E9760F-C0EB-47BB-8DA4-CC7815099DAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.8:netsec:*:*:*:*:*:*",
"matchCriteriaId": "EE6D9718-D57D-48F6-A2B1-CECAFFCDDFB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "4C510A9A-C3E2-4AF8-9919-1A22E918CDEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6BD915CD-A7D3-4305-A6C0-290C648A226C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.9.1:netsec:*:*:*:*:*:*",
"matchCriteriaId": "3249AB40-2058-42E9-9A33-64E434E5BB64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "9E79CCE5-C29B-4726-8D2F-BC20F70959BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.10:netsec:*:*:*:*:*:*",
"matchCriteriaId": "0CF6584D-A7BB-4BD5-8232-9293FEE4A971",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "F29C13DB-6F04-4B41-90A2-2408D70F3641",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.11:netsec:*:*:*:*:*:*",
"matchCriteriaId": "174D6B56-7D0F-46F0-849A-FD05CB348FAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "0F4F734E-0E78-4957-B323-8E9FBA7FF15C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.12:netsec:*:*:*:*:*:*",
"matchCriteriaId": "938F545A-F8A7-455E-8E5A-2B5454B6CE53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1A4B117B-E945-4033-A79D-10DFAA3DF18B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.12.1:netsec:*:*:*:*:*:*",
"matchCriteriaId": "E7C0897A-C841-4AAB-A6B3-1FCF7A99A60A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "EA6D866F-8189-4FFD-AA24-47C0A015C246",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.13:netsec:*:*:*:*:*:*",
"matchCriteriaId": "B2BAA1B3-7DD3-4248-915D-2BCC0ACFA2C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "A4EBFB79-C269-4132-BFAB-451F66CE8289",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.14:netsec:*:*:*:*:*:*",
"matchCriteriaId": "21612C17-7368-4108-B55B-5AB5CA6733E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "E9E1028E-2C07-4BA3-B891-FA853A87B280",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.15:netsec:*:*:*:*:*:*",
"matchCriteriaId": "8A0D57D7-15AD-4CDF-A5A7-AB83F8E6154E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9E74F577-70BD-4FAF-BCFD-10CD21FC5601",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.16:netsec:*:*:*:*:*:*",
"matchCriteriaId": "06DB25C8-4EA5-465F-8EFA-BCA8D40F1795",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "57BB03E2-E61C-4A94-82DF-8720698CE271",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.17:netsec:*:*:*:*:*:*",
"matchCriteriaId": "A149F8C2-3DA5-44B2-A288-3482F3975824",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "1B30A36F-5CE6-4246-8752-176FB5999C1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.18:netsec:*:*:*:*:*:*",
"matchCriteriaId": "9462B320-B69D-409D-8DCC-D8D6CA1A757D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "E0F76DFD-4DAC-4B02-8967-B242CDEEF6C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.19:netsec:*:*:*:*:*:*",
"matchCriteriaId": "ECCCBAE9-8FD4-43F0-9EF8-56E9BBA3D8C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "6A59BC20-3217-4584-9196-D1CD9E0D6B52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.20:netsec:*:*:*:*:*:*",
"matchCriteriaId": "BEA0014A-659B-4533-A393-6D4ADC80EB0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "56F728BA-FC9E-4EEE-9A08-C9C7433BD8D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.21:netsec:*:*:*:*:*:*",
"matchCriteriaId": "8F1621F9-7C84-4CF0-BBCD-CEAEE8683BAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3C64DF29-5B3D-401E-885E-8E37FD577254",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.21.1:netsec:*:*:*:*:*:*",
"matchCriteriaId": "346C9F65-B5FB-4A75-8E1B-137112F270D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "1A7BF52A-2FF8-40ED-B757-28A1101DE8F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.22:netsec:*:*:*:*:*:*",
"matchCriteriaId": "7EFEE380-0C64-4413-AF3A-45ABC8833500",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "7A321C2D-852B-4498-ADD6-79956410AB94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.23:netsec:*:*:*:*:*:*",
"matchCriteriaId": "8CA18FC6-1480-400E-A885-8CDAE45AA7A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:*",
"matchCriteriaId": "9D5F0DCF-C6A2-4A09-90C9-D70F174FDEF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.24:netsec:*:*:*:*:*:*",
"matchCriteriaId": "93741261-378B-4C02-8D68-0E5F39128375",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:*",
"matchCriteriaId": "C820538E-14EC-43C1-80DB-6AAE4905EF0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.25:netsec:*:*:*:*:*:*",
"matchCriteriaId": "07CF9DD6-B624-49F0-A8E4-7EBCE7932BEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.26:*:*:*:*:*:*:*",
"matchCriteriaId": "E9562112-2505-4F78-86DE-F30EFAEE47D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.26:netsec:*:*:*:*:*:*",
"matchCriteriaId": "9EEA1E9C-C1FB-4EFD-86EA-DCF78C57FC35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1A6D8FD0-C8C1-4868-9AF1-96B1949C18AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.1:netsec:*:*:*:*:*:*",
"matchCriteriaId": "5E20FAF7-9031-478E-A89C-D6FB3B5FDE3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:*",
"matchCriteriaId": "72A840B4-216B-4063-997F-791FBC8C8658",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.2:netsec:*:*:*:*:*:*",
"matchCriteriaId": "72375576-F857-4585-A677-A326D89A65B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "967DF432-DEF4-4FA2-8C8D-19A7FB663A33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "40850BF4-E252-4667-9B46-9B6FEF6E997D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "1BB01DD1-B29B-4210-88CC-9ADB3148A410",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "5C0FA6A3-BFA9-4397-B75B-75C8357C36B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "295D4042-2D3C-481B-B969-2DDAC1161198",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "044FD0D0-FC92-4A01-B0D4-11A703EF21FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3477EC1A-9634-492C-B052-35770A9C9F4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "1C90F104-FA2C-4091-B149-1774AC982C0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "C9328768-7C08-4143-B5F8-F5C2D735D21A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6C04E2B3-094B-4828-A2FC-BB66244A9F73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDE3D31-4BB2-45A3-B085-8C91152A3152",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.14:*:*:*:*:*:*:*",
"matchCriteriaId": "CE0107D4-395E-45F1-B963-7618CCC007D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.15:*:*:*:*:*:*:*",
"matchCriteriaId": "53B8E11B-4984-45A8-A107-D276205988B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.16:*:*:*:*:*:*:*",
"matchCriteriaId": "2495DB98-F923-4E60-86EC-2DBB7A98C90C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E186D125-996E-4900-A2B8-5CDC8B5D5136",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.2:*:*:*:*:*:*:*",
"matchCriteriaId": "27DC6CF7-4DF8-4472-A684-8CCB5E26FCFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.17:*:*:*:*:*:*:*",
"matchCriteriaId": "88576385-EF03-408B-9775-B52E6AFFE48A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.18:*:*:*:*:*:*:*",
"matchCriteriaId": "1A838577-2BA1-4792-8B69-6FB07FFD7727",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CDEED3E1-13E0-46E6-8AAB-D24D2D04AE4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:s800i:*:*:*:*:*:*:*:*",
"matchCriteriaId": "15C01793-C5D3-4359-B332-A8A104832370",
"versionEndIncluding": "1.1.0.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:s800i:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0C3A0A08-4107-4B8B-AE7E-DC23849A54DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:s800i:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9320928D-D83C-4258-AF62-AB2D1F50D972",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:s800i:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "569084D1-977D-41FC-A444-0B3F5199DDD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:s800i:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "02D182FB-761C-4F08-A776-B613FAC55230",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:s800i:1.0.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C9046D49-6878-4571-8B9E-2FBD5BA80D19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:s800i:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A7B5EDAB-61DD-4864-A159-39292D339DA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:s800i:1.1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "101DFEFB-7627-4D36-AAA2-EDFB4D0E5AB5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The IAX2 channel driver (chan_iax2) in Asterisk Open Source 1.0.x, 1.2.x before 1.2.28, and 1.4.x before 1.4.19.1; Business Edition A.x.x, B.x.x before B.2.5.2, and C.x.x before C.1.8.1; AsteriskNOW before 1.0.3; Appliance Developer Kit 0.x.x; and s800i before 1.1.0.3, when configured to allow unauthenticated calls, does not verify that an ACK response contains a call number matching the server\u0027s reply to a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed ACK response that does not complete a 3-way handshake. NOTE: this issue exists because of an incomplete fix for CVE-2008-1923."
},
{
"lang": "es",
"value": "El driver del canal IAX2 (chan_iax2) en Asterisk Open Source 1.0.x, 1.2.x anteriores a 1.2.28 y 1.4.x anteriores a 1.4.19.1; Business Edition A.x.x, B.x.x anteriores a B.2.5.2 y C.x.x anteriores a C.1.8.1; AsteriskNOW anteriores a 1.0.3; Apliance Developer Kit 0.x.x y s800i anterior a la 1.1.0.3, cuando est\u00e1 configurado para permitir llamadas no autenticadas, no verifica que una respuesta ACK contenga un n\u00famero que coincida con el de respuesta del servidor a un NUEVO mensaje, que puede permitir a los atacantes provocar una denegaci\u00f3n de servicio (amplificaci\u00f3n del tr\u00e1fico) a trav\u00e9s de una respuesta ACK falseada, que no complete la negociaci\u00f3n de 3 pasos. NOTA: Este problema existe debido a una correci\u00f3n incompleto para CVE-2008-1923"
}
],
"id": "CVE-2008-1897",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2008-04-23T16:05:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://bugs.digium.com/view.php?id=10078"
},
{
"source": "cve@mitre.org",
"url": "http://downloads.digium.com/pub/security/AST-2008-006.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29927"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30010"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30042"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/34982"
},
{
"source": "cve@mitre.org",
"url": "http://security.gentoo.org/glsa/glsa-200905-01.xml"
},
{
"source": "cve@mitre.org",
"url": "http://www.altsci.com/concepts/page.php?s=asteri\u0026p=2"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2008/dsa-1563"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/491220/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/28901"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1019918"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2008/1324"
},
{
"source": "cve@mitre.org",
"url": "https://downloads.asterisk.org/pub/security/AST-2008-006.html"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41966"
},
{
"source": "cve@mitre.org",
"url": "https://github.com/jcollie/asterisk/commit/60de4fbbdf3ede49f158e23a9e3b679f2e519c1e"
},
{
"source": "cve@mitre.org",
"url": "https://github.com/jcollie/asterisk/commit/771b3d8749b34b6eea4e03a2e514380da9582f90"
},
{
"source": "cve@mitre.org",
"url": "https://github.com/jcollie/asterisk/commit/a8b180875b037b8da26f6a3bcc8e5e98b8c904d2"
},
{
"source": "cve@mitre.org",
"url": "https://github.com/kaoru6/asterisk/commit/1fe14f38dd43dc894d21f85762b51208ba5c8acb"
},
{
"source": "cve@mitre.org",
"url": "https://github.com/lyx2014/Asterisk/commit/0670e43c30135044e25cca7f80e1833e2c128653"
},
{
"source": "cve@mitre.org",
"url": "https://github.com/mojolingo/asterisk/commit/20ac3662f137dbf7f42d5295590069a7d3b1166b"
},
{
"source": "cve@mitre.org",
"url": "https://github.com/pruiz/asterisk/commit/e0ef9bd22810c6969a7f222eec04798f19a7e2d6"
},
{
"source": "cve@mitre.org",
"url": "https://github.com/silentindark/asterisk-1/commit/fe8b7f31db687f8b9992864b82c93d22833019c7"
},
{
"source": "cve@mitre.org",
"url": "https://github.com/xrg/asterisk-xrg/commit/10da3dab24e8ca08cf2c983f8d0206e383535b5a"
},
{
"source": "cve@mitre.org",
"url": "https://github.com/xrg/asterisk-xrg/commit/51714a24347dc57f9a208a4a8af84115ef407b83"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00581.html"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00600.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://bugs.digium.com/view.php?id=10078"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://downloads.digium.com/pub/security/AST-2008-006.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29927"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30010"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30042"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/34982"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200905-01.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.altsci.com/concepts/page.php?s=asteri\u0026p=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2008/dsa-1563"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/491220/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/28901"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1019918"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/1324"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://downloads.asterisk.org/pub/security/AST-2008-006.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41966"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/jcollie/asterisk/commit/60de4fbbdf3ede49f158e23a9e3b679f2e519c1e"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/jcollie/asterisk/commit/771b3d8749b34b6eea4e03a2e514380da9582f90"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/jcollie/asterisk/commit/a8b180875b037b8da26f6a3bcc8e5e98b8c904d2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/kaoru6/asterisk/commit/1fe14f38dd43dc894d21f85762b51208ba5c8acb"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/lyx2014/Asterisk/commit/0670e43c30135044e25cca7f80e1833e2c128653"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/mojolingo/asterisk/commit/20ac3662f137dbf7f42d5295590069a7d3b1166b"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/pruiz/asterisk/commit/e0ef9bd22810c6969a7f222eec04798f19a7e2d6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/silentindark/asterisk-1/commit/fe8b7f31db687f8b9992864b82c93d22833019c7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/xrg/asterisk-xrg/commit/10da3dab24e8ca08cf2c983f8d0206e383535b5a"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/xrg/asterisk-xrg/commit/51714a24347dc57f9a208a4a8af84115ef407b83"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00581.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00600.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2008-1390
Vulnerability from fkie_nvd - Published: 2008-03-24 17:44 - Updated: 2025-04-09 00:30
Severity ?
Summary
The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "593AA737-5AF3-4F7C-B74B-D3F37701C435",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D942B911-979A-4AC3-93D6-07E420171E77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "84CB8C4A-F001-4DD7-8DFE-CB082B4BB969",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "96DB0240-E93D-4BDB-859B-B44C91996993",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0F4BA849-E092-404A-92CD-44C2D99AE971",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "2C7014B4-1860-49AD-9469-9954C3CC01C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3D1F0056-0945-476C-982E-7B41EB420A99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A53DEC9D-B288-42CD-9387-57315AC98D72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "89C1F33F-27B6-4C56-92FF-EB2861ABBC22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "64E07CF3-073D-4705-96A6-13367D4F5CAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "18D19CB0-E3D7-40DB-B0C0-B62BB6075267",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "77FB7CC1-BD0D-4F34-AB21-59CFD23C494C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "997FA3C7-1894-478A-ABF1-52DD2B0487E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.14:*:*:*:*:*:*:*",
"matchCriteriaId": "96E02BE0-BF4A-46C9-AFB5-47E8F18E3D17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.15:*:*:*:*:*:*:*",
"matchCriteriaId": "292190EE-D9C8-4E3A-BB34-0ECD7B865482",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.16:*:*:*:*:*:*:*",
"matchCriteriaId": "7DAC55F9-1D43-4AA8-87C9-DB165442700B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.17:*:*:*:*:*:*:*",
"matchCriteriaId": "195B012E-0538-4140-9035-F5D1A442778B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "78AC03A7-41AB-45AF-AD89-291A7429B8A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*",
"matchCriteriaId": "181C8E98-2138-4BFC-B6B0-1DA270AEE7F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4_revision_95946:*:*:*:*:*:*:*",
"matchCriteriaId": "DB08F4FA-8600-4D21-A565-B3BF636634B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FEAE6729-D79A-49B8-9758-BA74A60A238A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1C05B437-C292-4AA0-8AFE-1CA07CD80034",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0102C4C0-1A7D-4AB7-9817-44E6B0DB761E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "81DDF486-4185-48EE-869E-0AA6726C31F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "CF45A8E1-F6B1-42BD-9168-12062FA6EAEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C5757B9B-2759-439A-9A6D-CCDD6C8C8940",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FCD71268-EAA2-477B-8AC4-DE4853A262B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "529B2115-A191-4F3F-8F8C-A38B7C45463A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7E2D0508-C418-48CE-BF83-39F893688D1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta7:*:*:*:*:*:*:*",
"matchCriteriaId": "5BC80EBD-14D3-44A6-A06F-0549722E0EFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta8:*:*:*:*:*:*:*",
"matchCriteriaId": "7859797F-E9AD-4429-BD2C-A24EC24A5D03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisknow:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CC6FE17C-3B08-4675-9F73-5DC0C2438BB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:*",
"matchCriteriaId": "B12A09BE-1EE0-46D5-B3F0-E8847409A49A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:*",
"matchCriteriaId": "7A5A734E-1DD3-4924-8AC1-97048FA3270F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisknow:beta_7:*:*:*:*:*:*:*",
"matchCriteriaId": "3AE2F09E-4B5A-4EDF-A48A-BCBBAA80156B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:s800i:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0C3A0A08-4107-4B8B-AE7E-DC23849A54DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:s800i:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9320928D-D83C-4258-AF62-AB2D1F50D972",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:s800i:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "569084D1-977D-41FC-A444-0B3F5199DDD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:s800i:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "02D182FB-761C-4F08-A776-B613FAC55230",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:s800i:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A7B5EDAB-61DD-4864-A159-39292D339DA2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses."
},
{
"lang": "es",
"value": "El servidor AsteriskGUI HTTP en Asterisk Open Source 1.4.x antes de 1.4.19-rc3 y 1.6.x antes de 1.6.0-beta6, Business Edition C.x.x antes de C.1.6, AsteriskNOW antes de 1.0.2, Appliance Developer Kit antes de la revisi\u00f3n 104704 y s800i 1.0.x antes de 1.1.0.2 genera valores ID de gesti\u00f3n no lo suficientemente aleatorios, lo que facilita a atacantes remotos secuestrar una sesi\u00f3n de gesti\u00f3n a trav\u00e9s de una serie de adivinaciones de ID."
}
],
"id": "CVE-2008-1390",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2008-03-24T17:44:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://downloads.digium.com/pub/security/AST-2008-005.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29449"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/29470"
},
{
"source": "cve@mitre.org",
"url": "http://securityreason.com/securityalert/3764"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/489819/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/28316"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1019679"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41304"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://downloads.digium.com/pub/security/AST-2008-005.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29449"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/29470"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securityreason.com/securityalert/3764"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/489819/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/28316"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1019679"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41304"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-255"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2008-1289
Vulnerability from fkie_nvd - Published: 2008-03-24 17:44 - Updated: 2025-04-09 00:30
Severity ?
Summary
Multiple buffer overflows in Asterisk Open Source 1.4.x before 1.4.18.1 and 1.4.19-rc3, Open Source 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6.1, AsteriskNOW 1.0.x before 1.0.2, Appliance Developer Kit before 1.4 revision 109386, and s800i 1.1.x before 1.1.0.2 allow remote attackers to (1) write a zero to an arbitrary memory location via a large RTP payload number, related to the ast_rtp_unset_m_type function in main/rtp.c; or (2) write certain integers to an arbitrary memory location via a large number of RTP payloads, related to the process_sdp function in channels/chan_sip.c.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| asterisk | asterisk_appliance_developer_kit | 1.4 | |
| asterisk | asterisk_business_edition | * | |
| asterisk | asterisk_business_edition | * | |
| asterisk | asterisknow | * | |
| asterisk | open_source | * | |
| asterisk | open_source | * | |
| asterisk | open_source | * | |
| asterisk | s800i | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7E2D0508-C418-48CE-BF83-39F893688D1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1A80C0F3-F3F0-4BC6-92F8-131F3F875E34",
"versionEndIncluding": "c.1.0-beta8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*",
"matchCriteriaId": "526991C1-D07E-465C-A609-704C19F8096A",
"versionEndIncluding": "c.1.0beta7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisknow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B7C58E6B-AECC-48AF-8059-61772690776A",
"versionEndIncluding": "1.0.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E7F13399-5084-40FA-A4AB-D78ED588E434",
"versionEndIncluding": "1.4.18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:*:rc-2:*:*:*:*:*:*",
"matchCriteriaId": "F4AB8D8F-15AC-4516-85A2-B5D2B5B3DF04",
"versionEndIncluding": "1.4.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*",
"matchCriteriaId": "53B339C1-272B-4A7E-A342-8BBD9DC82826",
"versionEndIncluding": "1.6.0_beta5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:s800i:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6D1E04DC-AE6A-4536-8E45-36494E51B036",
"versionEndIncluding": "1.1.0.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple buffer overflows in Asterisk Open Source 1.4.x before 1.4.18.1 and 1.4.19-rc3, Open Source 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6.1, AsteriskNOW 1.0.x before 1.0.2, Appliance Developer Kit before 1.4 revision 109386, and s800i 1.1.x before 1.1.0.2 allow remote attackers to (1) write a zero to an arbitrary memory location via a large RTP payload number, related to the ast_rtp_unset_m_type function in main/rtp.c; or (2) write certain integers to an arbitrary memory location via a large number of RTP payloads, related to the process_sdp function in channels/chan_sip.c."
},
{
"lang": "es",
"value": "M\u00faltiples desbordamientos de b\u00fafer en Asterisk Open Source 1.4.x antes de 1.4.18.1 y 1.4.19-rc3, Open Source 1.6.x antes de 1.6.0-beta6, Business Edition C.x.x antes de C.1.6.1, AsteriskNOW 1.0.x antes de 1.0.2, Appliance Developer Kit antes de 1.4 revisi\u00f3n 109386 y s800i 1.1.x antes de 1.1.0.2 permite a atacantes remotos (1) escribir un cero en una posici\u00f3n de memoria de su elecci\u00f3n a trav\u00e9s de un n\u00famero de carga \u00fatil (payload) RTP grande, relacionada con la funci\u00f3n ast_rtp_unset_m_type en main/rtp.c; o (2) escribir ciertos enteros en una posici\u00f3n de memoria de su elecci\u00f3n a trav\u00e9s de un n\u00famero grande de cargas \u00fatiles RTP, relacionadas con la funci\u00f3n process_sdp en channels/chan_sip.c."
}
],
"id": "CVE-2008-1289",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2008-03-24T17:44:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://downloads.digium.com/pub/security/AST-2008-002.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://labs.musecurity.com/advisories/MU-200803-01.txt"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29426"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/29470"
},
{
"source": "cve@mitre.org",
"url": "http://securityreason.com/securityalert/3763"
},
{
"source": "cve@mitre.org",
"url": "http://securitytracker.com/id?1019628"
},
{
"source": "cve@mitre.org",
"url": "http://www.asterisk.org/node/48466"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/489817/100/0/threaded"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/28308"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2008/0928"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41302"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41305"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://downloads.digium.com/pub/security/AST-2008-002.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://labs.musecurity.com/advisories/MU-200803-01.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29426"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/29470"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securityreason.com/securityalert/3763"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1019628"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.asterisk.org/node/48466"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/489817/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/28308"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/0928"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41302"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41305"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2008-1332
Vulnerability from fkie_nvd - Published: 2008-03-20 00:44 - Updated: 2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:asterisk:asterisk:a:*:business:*:*:*:*:*",
"matchCriteriaId": "C6702046-43CF-4C84-9F76-24716C9F7D20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.2:*:business:*:*:*:*:*",
"matchCriteriaId": "524CF00B-1B36-4C1F-80B4-28349891669B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.3:*:business:*:*:*:*:*",
"matchCriteriaId": "2942FA48-42CE-4E67-A5BF-7852652EDE28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:b.2.2.0:*:business:*:*:*:*:*",
"matchCriteriaId": "4160A834-9194-474C-819B-60627E470D13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:b.2.2.1:*:business:*:*:*:*:*",
"matchCriteriaId": "D81F6E55-80F1-4770-9FF0-305EEEF3C4E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.1:*:business:*:*:*:*:*",
"matchCriteriaId": "087DC9EC-0DF2-48AE-BB62-8DDF95C3EC56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.2:*:business:*:*:*:*:*",
"matchCriteriaId": "471032A5-5EB6-44D1-91C8-BEA42C1E205A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.3:*:business:*:*:*:*:*",
"matchCriteriaId": "6FEB3FCA-065E-4C32-A4C7-F2C79F214F17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.4:*:business:*:*:*:*:*",
"matchCriteriaId": "636D765F-C47B-4762-9419-D7B51FA38AEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.5:*:business:*:*:*:*:*",
"matchCriteriaId": "36F29EE8-E05F-4F0A-B0FA-66C551856C3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.6:*:business:*:*:*:*:*",
"matchCriteriaId": "CEAA72FE-E13C-4363-AF5C-7D1CEEE2FA77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:c.1.0_beta7:*:business:*:*:*:*:*",
"matchCriteriaId": "D0A87D63-35F5-47D7-893B-E8B179B16C3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:c.1.0_beta8:*:business:*:*:*:*:*",
"matchCriteriaId": "95C1809E-9031-483F-B873-160284FA71D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:c.1.6:*:business:*:*:*:*:*",
"matchCriteriaId": "E35C336A-A786-476B-8B9F-E682D999B6AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:c.1.6.1:*:business:*:*:*:*:*",
"matchCriteriaId": "8121721B-EBC6-44EA-86D6-7B0FF1C8FF52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DEF22BFB-2B22-4FBE-AE35-D7BC2A461865",
"versionEndIncluding": "1.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1C05B437-C292-4AA0-8AFE-1CA07CD80034",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0102C4C0-1A7D-4AB7-9817-44E6B0DB761E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "81DDF486-4185-48EE-869E-0AA6726C31F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "CF45A8E1-F6B1-42BD-9168-12062FA6EAEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C5757B9B-2759-439A-9A6D-CCDD6C8C8940",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E4548D39-0562-4946-AA51-A7C1A31AEE8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FCD71268-EAA2-477B-8AC4-DE4853A262B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "529B2115-A191-4F3F-8F8C-A38B7C45463A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B76EFDCA-20EC-4C62-A0AD-CBD317D69441",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D4EC98BF-00C0-48F5-ADFA-DB8AC6E95F3A",
"versionEndIncluding": "a",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9E140B81-4528-4BCC-AE60-B91DD4B2C9FE",
"versionEndIncluding": "b.2.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E8CF6B9-050B-426B-86FC-8A32E8C09A68",
"versionEndIncluding": "c.1.6.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisknow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B7C58E6B-AECC-48AF-8059-61772690776A",
"versionEndIncluding": "1.0.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisknow:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CC6FE17C-3B08-4675-9F73-5DC0C2438BB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A66DC4A6-290C-48ED-A0F8-8DC05EA0AAC6",
"versionEndIncluding": "1.2.26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6CEDD6A3-13B1-4553-8BAD-93DB5203F3B6",
"versionEndIncluding": "1.4.17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:*:rc-2:*:*:*:*:*:*",
"matchCriteriaId": "F4AB8D8F-15AC-4516-85A2-B5D2B5B3DF04",
"versionEndIncluding": "1.4.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "678DB154-4363-42FF-8B28-367923FC6595",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E8F2C378-FF0E-4765-9F66-625C4064D5CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A55A9295-F632-4856-90A1-38371EB98589",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7FAE6AF1-884D-41F7-B174-9E13C7719C99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DCA9E35B-9A6B-42F2-9315-9C7D09F62227",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "89B1F293-4F0F-48FD-A1F1-1230B94D87D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DDF7EC20-A424-45E5-B7E4-3CC86075858C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C790E105-55C8-4CDC-9FA8-E1FF6F130A67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "44C860EF-2B29-4995-B942-000CC43FDD14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1ADB80EF-C724-44BA-88FC-24087799D0C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "78B39BE8-7E2D-42DF-8633-44CAD5662777",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F39036E3-0027-4C72-9DEB-9A6E2B4512C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A037E6F9-3EF7-4EEB-AC16-081421BCE40D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6A7EC02A-9C9E-4589-BBB3-1908D3078A7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "6C70FA9C-6F3B-4BDF-97FB-81D06AB0EE65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9F7971E1-F136-4ADC-95EC-BC4F92E838CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "E62D108C-862D-4BDB-BE37-285AA4C9C59A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "CF1422F3-829D-498C-83A6-02989DFB70A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "CBEB9D69-A404-4053-92F9-CAC3481AFF1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.0beta2:*:*:*:*:*:*:*",
"matchCriteriaId": "C7B2F43B-8B69-4BF6-86B7-A225175FF068",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "27202966-2C41-4964-9497-1887D2A834C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1471B5A2-15BE-4E7C-BA49-2E6002F7C8EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7108D72F-5AFD-4EEF-B2A9-CA4FA792E193",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "107DA2D8-FE7C-4B70-856D-43D58B988694",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "ABD71DD9-8A15-45E2-9FB3-F0544D7E1B80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5C14614F-4E27-40A6-9E56-2B1DBB10330B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7A2F2F5A-66FD-4057-917C-66332A88D83E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "399B0206-B48B-46EF-8CA6-A6E5A2550B25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "26E9760F-C0EB-47BB-8DA4-CC7815099DAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "4C510A9A-C3E2-4AF8-9919-1A22E918CDEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6BD915CD-A7D3-4305-A6C0-290C648A226C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "9E79CCE5-C29B-4726-8D2F-BC20F70959BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "F29C13DB-6F04-4B41-90A2-2408D70F3641",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "0F4F734E-0E78-4957-B323-8E9FBA7FF15C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1A4B117B-E945-4033-A79D-10DFAA3DF18B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "EA6D866F-8189-4FFD-AA24-47C0A015C246",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "A4EBFB79-C269-4132-BFAB-451F66CE8289",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "E9E1028E-2C07-4BA3-B891-FA853A87B280",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9E74F577-70BD-4FAF-BCFD-10CD21FC5601",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "57BB03E2-E61C-4A94-82DF-8720698CE271",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "1B30A36F-5CE6-4246-8752-176FB5999C1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "E0F76DFD-4DAC-4B02-8967-B242CDEEF6C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "6A59BC20-3217-4584-9196-D1CD9E0D6B52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "56F728BA-FC9E-4EEE-9A08-C9C7433BD8D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3C64DF29-5B3D-401E-885E-8E37FD577254",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "1A7BF52A-2FF8-40ED-B757-28A1101DE8F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "7A321C2D-852B-4498-ADD6-79956410AB94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:*",
"matchCriteriaId": "9D5F0DCF-C6A2-4A09-90C9-D70F174FDEF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:*",
"matchCriteriaId": "C820538E-14EC-43C1-80DB-6AAE4905EF0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1A6D8FD0-C8C1-4868-9AF1-96B1949C18AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:*",
"matchCriteriaId": "72A840B4-216B-4063-997F-791FBC8C8658",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "967DF432-DEF4-4FA2-8C8D-19A7FB663A33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "40850BF4-E252-4667-9B46-9B6FEF6E997D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "1BB01DD1-B29B-4210-88CC-9ADB3148A410",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "5C0FA6A3-BFA9-4397-B75B-75C8357C36B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "295D4042-2D3C-481B-B969-2DDAC1161198",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "044FD0D0-FC92-4A01-B0D4-11A703EF21FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3477EC1A-9634-492C-B052-35770A9C9F4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "1C90F104-FA2C-4091-B149-1774AC982C0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "C9328768-7C08-4143-B5F8-F5C2D735D21A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6C04E2B3-094B-4828-A2FC-BB66244A9F73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDE3D31-4BB2-45A3-B085-8C91152A3152",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.14:*:*:*:*:*:*:*",
"matchCriteriaId": "CE0107D4-395E-45F1-B963-7618CCC007D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.15:*:*:*:*:*:*:*",
"matchCriteriaId": "53B8E11B-4984-45A8-A107-D276205988B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.16:*:*:*:*:*:*:*",
"matchCriteriaId": "2495DB98-F923-4E60-86EC-2DBB7A98C90C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E186D125-996E-4900-A2B8-5CDC8B5D5136",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.2:*:*:*:*:*:*:*",
"matchCriteriaId": "27DC6CF7-4DF8-4472-A684-8CCB5E26FCFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.18:*:*:*:*:*:*:*",
"matchCriteriaId": "1A838577-2BA1-4792-8B69-6FB07FFD7727",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "C4FF0F09-0268-480F-A2F3-6F8C3F323EEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:s800i:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6D1E04DC-AE6A-4536-8E45-36494E51B036",
"versionEndIncluding": "1.1.0.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:s800i:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0C3A0A08-4107-4B8B-AE7E-DC23849A54DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:s800i:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9320928D-D83C-4258-AF62-AB2D1F50D972",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:s800i:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "569084D1-977D-41FC-A444-0B3F5199DDD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:s800i:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "02D182FB-761C-4F08-A776-B613FAC55230",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:s800i:1.0.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C9046D49-6878-4571-8B9E-2FBD5BA80D19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:s800i:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A7B5EDAB-61DD-4864-A159-39292D339DA2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header."
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en Asterisk Open Source versiones 1.2.x anteriores a 1.2.27, 1.4.x anteriores a 1.4.18.1 y 1.4.19-rc3; en Business Edition versiones A.x.x, B.x.x anteriores a B.2.5.1, y C.x.x anteriores a C.1.6.2; en AsteriskNOW versiones 1.0.x anteriores a 1.0.2; Appliance Developer Kit anteriores a 1.4 revisi\u00f3n 109393; y s800i versiones 1.0.x anteriores a 1.1.0.2 permite a atacantes remotos acceder al controlador del canal SIP mediante la utilizaci\u00f3n de una cabecera From especialmente construida."
}
],
"id": "CVE-2008-1332",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 8.8,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 9.2,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2008-03-20T00:44:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://downloads.digium.com/pub/security/AST-2008-003.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29426"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29456"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29470"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29782"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29957"
},
{
"source": "cve@mitre.org",
"url": "http://security.gentoo.org/glsa/glsa-200804-13.xml"
},
{
"source": "cve@mitre.org",
"url": "http://securitytracker.com/id?1019629"
},
{
"source": "cve@mitre.org",
"url": "http://www.asterisk.org/node/48466"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2008/dsa-1525"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/489818/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/28310"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2008/0928"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41308"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://downloads.digium.com/pub/security/AST-2008-003.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29426"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29456"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29470"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29782"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29957"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200804-13.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1019629"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.asterisk.org/node/48466"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2008/dsa-1525"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/489818/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/28310"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/0928"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41308"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2008-0095
Vulnerability from fkie_nvd - Published: 2008-01-08 02:46 - Updated: 2025-04-09 00:30
Severity ?
Summary
The SIP channel driver in Asterisk Open Source 1.4.x before 1.4.17, Business Edition before C.1.0-beta8, AsteriskNOW before beta7, Appliance Developer Kit before Asterisk 1.4 revision 95946, and Appliance s800i 1.0.x before 1.0.3.4 allows remote attackers to cause a denial of service (daemon crash) via a BYE message with an Also (Also transfer) header, which triggers a NULL pointer dereference.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| asterisk | asterisk_appliance_developer_kit | * | |
| asterisk | asterisk_business_edition | * | |
| asterisk | asterisknow | * | |
| asterisk | open_source | * | |
| asterisk | s800i | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0D6AD937-90F0-4359-85DD-038604F64D2D",
"versionEndIncluding": "1.4_revision_95945",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*",
"matchCriteriaId": "526991C1-D07E-465C-A609-704C19F8096A",
"versionEndIncluding": "c.1.0beta7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisknow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C896A32E-906D-4AD0-A00B-11DC064CBA6E",
"versionEndIncluding": "beta_6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B2EF54E7-C4A1-474F-9D89-18E13F620F42",
"versionEndIncluding": "1.4.16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:s800i:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AFA6388A-09B4-4338-8228-3E27500DD521",
"versionEndIncluding": "1.0.3.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The SIP channel driver in Asterisk Open Source 1.4.x before 1.4.17, Business Edition before C.1.0-beta8, AsteriskNOW before beta7, Appliance Developer Kit before Asterisk 1.4 revision 95946, and Appliance s800i 1.0.x before 1.0.3.4 allows remote attackers to cause a denial of service (daemon crash) via a BYE message with an Also (Also transfer) header, which triggers a NULL pointer dereference."
},
{
"lang": "es",
"value": "El controlador de canal SIP de Asterisk Open Source 1.4.x versiones anteriores a 1.4.17, Business Edition versiones anteriores a C.1.0-beta8, AsteriskNOW versiones anteriores a beta7, Appliance Developer Kit versiones anteriores a Asterisk 1.4 revision 95946, y Appliance s800i 1.0.x versiones anteriores a 1.0.3.4 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (c\u00e1ida de demonio) mediante un mensaje BYE con una cabecera Also (tranfiere tambi\u00e9n), que dispara un referencia a puntero NULL."
}
],
"id": "CVE-2008-0095",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2008-01-08T02:46:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://bugs.digium.com/view.php?id=11637"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://downloads.digium.com/pub/security/AST-2008-001.html"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/28299"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28312"
},
{
"source": "cve@mitre.org",
"url": "http://securityreason.com/securityalert/3520"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/485727/100/0/threaded"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
],
"url": "http://www.securityfocus.com/bid/27110"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1019152"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2008/0019"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39361"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00166.html"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00167.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://bugs.digium.com/view.php?id=11637"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://downloads.digium.com/pub/security/AST-2008-001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28299"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28312"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securityreason.com/securityalert/3520"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/485727/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch"
],
"url": "http://www.securityfocus.com/bid/27110"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1019152"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/0019"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39361"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00166.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00167.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2007-4455
Vulnerability from fkie_nvd - Published: 2007-08-22 01:17 - Updated: 2025-04-09 00:30
Severity ?
Summary
The SIP channel driver (chan_sip) in Asterisk Open Source 1.4.x before 1.4.11, AsteriskNOW before beta7, Asterisk Appliance Developer Kit 0.x before 0.8.0, and s800i (Asterisk Appliance) 1.x before 1.0.3 allows remote attackers to cause a denial of service (memory exhaustion) via a SIP dialog that causes a large number of history entries to be created.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| asterisk | asterisk | * | |
| asterisk | asterisk_appliance_developer_kit | * | |
| asterisk | asterisknow | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:asterisk:asterisk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28786BB7-9F94-4193-81FC-83B836B9B530",
"versionEndIncluding": "1.4.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A8C03D5E-5EBE-42C9-BA54-10F1ED76D61C",
"versionEndIncluding": "0.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisknow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C896A32E-906D-4AD0-A00B-11DC064CBA6E",
"versionEndIncluding": "beta_6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The SIP channel driver (chan_sip) in Asterisk Open Source 1.4.x before 1.4.11, AsteriskNOW before beta7, Asterisk Appliance Developer Kit 0.x before 0.8.0, and s800i (Asterisk Appliance) 1.x before 1.0.3 allows remote attackers to cause a denial of service (memory exhaustion) via a SIP dialog that causes a large number of history entries to be created."
},
{
"lang": "es",
"value": "El controlador de canal SIP (chan_sip) en Asterisk Open Source 1.4.x anterior a 1.4.11, AsteriskNOW anterior a beta7, Asterisk Appliance Developer Kit 0.x anterior a 0.8.0, y s800i (Asterisk Appliance) 1.x anterior a 1.0.3 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (agotamiento de memoria) mediante un di\u00e1logo SIP que provoca que se cree un gran n\u00famero de entradas de hist\u00f3rico."
}
],
"id": "CVE-2007-4455",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-08-22T01:17:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://downloads.digium.com/pub/asa/AST-2007-020.html"
},
{
"source": "cve@mitre.org",
"url": "http://seclists.org/fulldisclosure/2007/Aug/0393.html"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/26553"
},
{
"source": "cve@mitre.org",
"url": "http://securityreason.com/securityalert/3047"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/25392"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1018595"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/2953"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36145"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://downloads.digium.com/pub/asa/AST-2007-020.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2007/Aug/0393.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/26553"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securityreason.com/securityalert/3047"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/25392"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1018595"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/2953"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36145"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2007-4280
Vulnerability from fkie_nvd - Published: 2007-08-09 21:17 - Updated: 2025-04-09 00:30
Severity ?
Summary
The Skinny channel driver (chan_skinny) in Asterisk Open Source before 1.4.10, AsteriskNOW before beta7, Appliance Developer Kit before 0.7.0, and Appliance s800i before 1.0.3 allows remote authenticated users to cause a denial of service (application crash) via a CAPABILITIES_RES_MESSAGE packet with a capabilities count larger than the capabilities_res_message array population.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| asterisk | asterisk | * | |
| asterisk | asterisk_appliance_developer_kit | * | |
| asterisk | asterisknow | * | |
| asterisk | s800i | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:asterisk:asterisk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28786BB7-9F94-4193-81FC-83B836B9B530",
"versionEndIncluding": "1.4.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*",
"matchCriteriaId": "39776C64-0067-4EBD-A5DD-6B7FB17B7603",
"versionEndIncluding": "0.6.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisknow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C896A32E-906D-4AD0-A00B-11DC064CBA6E",
"versionEndIncluding": "beta_6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:s800i:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4CE11A7E-2893-47E4-897B-28BBAD984858",
"versionEndIncluding": "1.0.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Skinny channel driver (chan_skinny) in Asterisk Open Source before 1.4.10, AsteriskNOW before beta7, Appliance Developer Kit before 0.7.0, and Appliance s800i before 1.0.3 allows remote authenticated users to cause a denial of service (application crash) via a CAPABILITIES_RES_MESSAGE packet with a capabilities count larger than the capabilities_res_message array population."
},
{
"lang": "es",
"value": "El dispositivo de canal Skinny (chan_skinny) en el Asterisk Open Source anterior al 1.4.10, el AsteriskNOW anterior al beta7, el Appliance Developer Kit anterior al 0.7.0 y el Appliance s800i before 1.0.3 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s del paquete CAPABILITIES_RES_MESSAGE con una capacidad de escrutinio mayor que el array capabilities_res_message de poblaci\u00f3n."
}
],
"id": "CVE-2007-4280",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-08-09T21:17:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://downloads.digium.com/pub/asa/ASA-2007-019.pdf"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26340"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/25228"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1018536"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/2808"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35870"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://downloads.digium.com/pub/asa/ASA-2007-019.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26340"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/25228"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1018536"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/2808"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35870"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2007-3763
Vulnerability from fkie_nvd - Published: 2007-07-18 17:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
The IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted (1) LAGRQ or (2) LAGRP frame that contains information elements of IAX frames, which results in a NULL pointer dereference when Asterisk does not properly set an associated variable.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| asterisk | asterisk | 1.0 | |
| asterisk | asterisk | 1.0.6 | |
| asterisk | asterisk | 1.0.7 | |
| asterisk | asterisk | 1.0.8 | |
| asterisk | asterisk | 1.0.9 | |
| asterisk | asterisk | 1.0.10 | |
| asterisk | asterisk | 1.0.11 | |
| asterisk | asterisk | 1.0.12 | |
| asterisk | asterisk | 1.2.0_beta1 | |
| asterisk | asterisk | 1.2.0_beta2 | |
| asterisk | asterisk | 1.2.5 | |
| asterisk | asterisk | 1.2.6 | |
| asterisk | asterisk | 1.2.7 | |
| asterisk | asterisk | 1.2.8 | |
| asterisk | asterisk | 1.2.9 | |
| asterisk | asterisk | 1.2.10 | |
| asterisk | asterisk | 1.2.11 | |
| asterisk | asterisk | 1.2.12 | |
| asterisk | asterisk | 1.2.13 | |
| asterisk | asterisk | 1.2.14 | |
| asterisk | asterisk | 1.2.15 | |
| asterisk | asterisk | 1.2.16 | |
| asterisk | asterisk | 1.2.17 | |
| asterisk | asterisk | 1.4.1 | |
| asterisk | asterisk | 1.4.2 | |
| asterisk | asterisk | 1.4.4_2007-04-27 | |
| asterisk | asterisk | 1.4_beta | |
| asterisk | asterisk | a | |
| asterisk | asterisk | b.1.3.2 | |
| asterisk | asterisk | b.1.3.3 | |
| asterisk | asterisk | b.2.2.0 | |
| asterisk | asterisk_appliance_developer_kit | * | |
| asterisk | asterisknow | beta_5 | |
| asterisk | asterisknow | beta_6 | |
| asterisk | s800i_appliance | 1.0 | |
| asterisk | s800i_appliance | 1.0.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "54F50B72-EFB3-448F-A2B8-C2BE4D4BF341",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "69BE50A7-FCA8-470A-B212-A516224306EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E306F943-ECA2-41C8-8C5D-F6A3D68ECE79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "3C309D90-24ED-4DC7-A770-783A7E28705F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "1B6DFD0D-86CE-4423-A0F4-C3581F916038",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "77255177-4EB2-47F5-8B3A-F6164C3C8173",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "2145ECD7-D734-4D58-8474-2F38DF9DB94F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "38C3AAB7-EA93-40BA-8ADE-380DA3520747",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta1:*:*:*:*:*:*:*",
"matchCriteriaId": "E97310AF-E163-4C4F-A0BE-2940A67C336B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta2:*:*:*:*:*:*:*",
"matchCriteriaId": "66A7A018-4EB6-4C15-9A22-E4299A6919C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A7A7F90E-4600-4058-BB10-E39BE8F4968F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5722AD0B-B329-4DA3-A251-A18DD6EE505E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "18B8E66C-B2EB-4F1F-9226-07A957885D8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "ECD3CBC1-1371-440A-9EA1-7495A4FA2C49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "1B4841AD-96B7-4518-AC3E-3D23C88C083B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C89A173C-C64A-440F-BCC6-EDE692521171",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "C716CAB8-5F2D-44DA-982B-3A47B3B59A1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F0FABB45-93A9-49BB-93DA-D13305E2FF84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "A5F82331-A7C1-4166-AE45-A83BD7FC3D25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "26A10E99-3A8C-430A-8FB6-4A55E01A00E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "E5DF84B2-A104-4FA2-8B02-D243D76ACEE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "B4BA2270-DF93-48FB-A90F-DFBFED05F051",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "B4FE0264-95E4-4B75-8904-369035DEA2F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "593AA737-5AF3-4F7C-B74B-D3F37701C435",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D942B911-979A-4AC3-93D6-07E420171E77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.4_2007-04-27:*:*:*:*:*:*:*",
"matchCriteriaId": "465DB1C7-D5DD-4A2D-8506-8642AB8363C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*",
"matchCriteriaId": "181C8E98-2138-4BFC-B6B0-1DA270AEE7F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:a:*:business:*:*:*:*:*",
"matchCriteriaId": "C6702046-43CF-4C84-9F76-24716C9F7D20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.2:*:business:*:*:*:*:*",
"matchCriteriaId": "524CF00B-1B36-4C1F-80B4-28349891669B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.3:*:business:*:*:*:*:*",
"matchCriteriaId": "2942FA48-42CE-4E67-A5BF-7852652EDE28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:b.2.2.0:*:business:*:*:*:*:*",
"matchCriteriaId": "4160A834-9194-474C-819B-60627E470D13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6C150564-406F-4B49-AEF8-0F2887738E4D",
"versionEndIncluding": "0.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:*",
"matchCriteriaId": "B12A09BE-1EE0-46D5-B3F0-E8847409A49A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:*",
"matchCriteriaId": "7A5A734E-1DD3-4924-8AC1-97048FA3270F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9282AC42-E98A-4BC2-B46D-15B5776C961F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "83DBFD69-2500-46C1-827C-1493CF896F49",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted (1) LAGRQ or (2) LAGRP frame that contains information elements of IAX frames, which results in a NULL pointer dereference when Asterisk does not properly set an associated variable."
},
{
"lang": "es",
"value": "El gestor de dispositivo de canal IAX2 (chan_iax2) en Asterisk versiones anteriores a 1.2.22 y 1.4.x versiones anteriores a 1.4.8, Business Edition versiones anteriores a B.2.2.1, AsteriskNOW versiones anteriores a beta7, Appliance Developer Kit versiones anteriores a 0.5.0, y s800i versiones anteriores a 1.0.2 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante tramas (1) LAGRQ \u00f3 (2) LAGRP que contienen elementos de informaci\u00f3n de tramas IAX, que resulta en una referencia a puntero NULL cuando Asterisk no asigna apropiadamente una variable asociado."
}
],
"id": "CVE-2007-3763",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-07-18T17:30:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=185713"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://ftp.digium.com/pub/asa/ASA-2007-015.pdf"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/26099"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/29051"
},
{
"source": "cve@mitre.org",
"url": "http://security.gentoo.org/glsa/glsa-200802-11.xml"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2007/dsa-1358"
},
{
"source": "cve@mitre.org",
"url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/24950"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1018407"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/2563"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=185713"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://ftp.digium.com/pub/asa/ASA-2007-015.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/26099"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/29051"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200802-11.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2007/dsa-1358"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/24950"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1018407"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/2563"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2007-3762
Vulnerability from fkie_nvd - Published: 2007-07-18 17:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in the IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to execute arbitrary code by sending a long (1) voice or (2) video RTP frame.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| asterisk | asterisk | 1.0 | |
| asterisk | asterisk | 1.0.6 | |
| asterisk | asterisk | 1.0.7 | |
| asterisk | asterisk | 1.0.8 | |
| asterisk | asterisk | 1.0.9 | |
| asterisk | asterisk | 1.0.10 | |
| asterisk | asterisk | 1.0.11 | |
| asterisk | asterisk | 1.0.12 | |
| asterisk | asterisk | 1.2.0_beta1 | |
| asterisk | asterisk | 1.2.0_beta2 | |
| asterisk | asterisk | 1.2.5 | |
| asterisk | asterisk | 1.2.6 | |
| asterisk | asterisk | 1.2.7 | |
| asterisk | asterisk | 1.2.8 | |
| asterisk | asterisk | 1.2.9 | |
| asterisk | asterisk | 1.2.10 | |
| asterisk | asterisk | 1.2.11 | |
| asterisk | asterisk | 1.2.12 | |
| asterisk | asterisk | 1.2.13 | |
| asterisk | asterisk | 1.2.14 | |
| asterisk | asterisk | 1.2.15 | |
| asterisk | asterisk | 1.2.16 | |
| asterisk | asterisk | 1.2.17 | |
| asterisk | asterisk | 1.4.1 | |
| asterisk | asterisk | 1.4.2 | |
| asterisk | asterisk | 1.4.4_2007-04-27 | |
| asterisk | asterisk | 1.4_beta | |
| asterisk | asterisk | a | |
| asterisk | asterisk | b.1.3.2 | |
| asterisk | asterisk | b.1.3.3 | |
| asterisk | asterisk | b.2.2.0 | |
| asterisk | asterisk_appliance_developer_kit | * | |
| asterisk | asterisknow | beta_5 | |
| asterisk | asterisknow | beta_6 | |
| asterisk | s800i_appliance | 1.0 | |
| asterisk | s800i_appliance | 1.0.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "54F50B72-EFB3-448F-A2B8-C2BE4D4BF341",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "69BE50A7-FCA8-470A-B212-A516224306EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E306F943-ECA2-41C8-8C5D-F6A3D68ECE79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "3C309D90-24ED-4DC7-A770-783A7E28705F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "1B6DFD0D-86CE-4423-A0F4-C3581F916038",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "77255177-4EB2-47F5-8B3A-F6164C3C8173",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "2145ECD7-D734-4D58-8474-2F38DF9DB94F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "38C3AAB7-EA93-40BA-8ADE-380DA3520747",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta1:*:*:*:*:*:*:*",
"matchCriteriaId": "E97310AF-E163-4C4F-A0BE-2940A67C336B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta2:*:*:*:*:*:*:*",
"matchCriteriaId": "66A7A018-4EB6-4C15-9A22-E4299A6919C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A7A7F90E-4600-4058-BB10-E39BE8F4968F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5722AD0B-B329-4DA3-A251-A18DD6EE505E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "18B8E66C-B2EB-4F1F-9226-07A957885D8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "ECD3CBC1-1371-440A-9EA1-7495A4FA2C49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "1B4841AD-96B7-4518-AC3E-3D23C88C083B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C89A173C-C64A-440F-BCC6-EDE692521171",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "C716CAB8-5F2D-44DA-982B-3A47B3B59A1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F0FABB45-93A9-49BB-93DA-D13305E2FF84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "A5F82331-A7C1-4166-AE45-A83BD7FC3D25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "26A10E99-3A8C-430A-8FB6-4A55E01A00E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "E5DF84B2-A104-4FA2-8B02-D243D76ACEE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "B4BA2270-DF93-48FB-A90F-DFBFED05F051",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "B4FE0264-95E4-4B75-8904-369035DEA2F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "593AA737-5AF3-4F7C-B74B-D3F37701C435",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D942B911-979A-4AC3-93D6-07E420171E77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.4_2007-04-27:*:*:*:*:*:*:*",
"matchCriteriaId": "465DB1C7-D5DD-4A2D-8506-8642AB8363C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*",
"matchCriteriaId": "181C8E98-2138-4BFC-B6B0-1DA270AEE7F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:a:*:business:*:*:*:*:*",
"matchCriteriaId": "C6702046-43CF-4C84-9F76-24716C9F7D20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.2:*:business:*:*:*:*:*",
"matchCriteriaId": "524CF00B-1B36-4C1F-80B4-28349891669B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.3:*:business:*:*:*:*:*",
"matchCriteriaId": "2942FA48-42CE-4E67-A5BF-7852652EDE28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:b.2.2.0:*:business:*:*:*:*:*",
"matchCriteriaId": "4160A834-9194-474C-819B-60627E470D13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6C150564-406F-4B49-AEF8-0F2887738E4D",
"versionEndIncluding": "0.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:*",
"matchCriteriaId": "B12A09BE-1EE0-46D5-B3F0-E8847409A49A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:*",
"matchCriteriaId": "7A5A734E-1DD3-4924-8AC1-97048FA3270F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9282AC42-E98A-4BC2-B46D-15B5776C961F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "83DBFD69-2500-46C1-827C-1493CF896F49",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to execute arbitrary code by sending a long (1) voice or (2) video RTP frame."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer basado en pila en el controlador de canal IAX2 (chan_iax2) de Asterisk anterior a 1.2.22 y 1.4.x anterior a 1.4.8, Business Edition anterior a B.2.2.1, AsteriskNOW anterior a beta7, Appliance Developer Kit anterior a 0.5.0, y s800i anterior a 1.0.2 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n enviando una trama RTP larga de (1) voz o (2) v\u00eddeo."
}
],
"id": "CVE-2007-3762",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-07-18T17:30:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=185713"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://ftp.digium.com/pub/asa/ASA-2007-014.pdf"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/26099"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/29051"
},
{
"source": "cve@mitre.org",
"url": "http://security.gentoo.org/glsa/glsa-200802-11.xml"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2007/dsa-1358"
},
{
"source": "cve@mitre.org",
"url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/24949"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1018407"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/2563"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35466"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=185713"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://ftp.digium.com/pub/asa/ASA-2007-014.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/26099"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/29051"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200802-11.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2007/dsa-1358"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/24949"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1018407"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/2563"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35466"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2007-3764
Vulnerability from fkie_nvd - Published: 2007-07-18 17:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
The Skinny channel driver (chan_skinny) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a certain data length value in a crafted packet, which results in an "overly large memcpy."
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| asterisk | asterisk | 1.0 | |
| asterisk | asterisk | 1.0.6 | |
| asterisk | asterisk | 1.0.7 | |
| asterisk | asterisk | 1.0.8 | |
| asterisk | asterisk | 1.0.9 | |
| asterisk | asterisk | 1.0.10 | |
| asterisk | asterisk | 1.0.11 | |
| asterisk | asterisk | 1.0.12 | |
| asterisk | asterisk | 1.2.0_beta1 | |
| asterisk | asterisk | 1.2.0_beta2 | |
| asterisk | asterisk | 1.2.5 | |
| asterisk | asterisk | 1.2.6 | |
| asterisk | asterisk | 1.2.7 | |
| asterisk | asterisk | 1.2.8 | |
| asterisk | asterisk | 1.2.9 | |
| asterisk | asterisk | 1.2.10 | |
| asterisk | asterisk | 1.2.11 | |
| asterisk | asterisk | 1.2.12 | |
| asterisk | asterisk | 1.2.13 | |
| asterisk | asterisk | 1.2.14 | |
| asterisk | asterisk | 1.2.15 | |
| asterisk | asterisk | 1.2.16 | |
| asterisk | asterisk | 1.2.17 | |
| asterisk | asterisk | 1.4.1 | |
| asterisk | asterisk | 1.4.2 | |
| asterisk | asterisk | 1.4.4_2007-04-27 | |
| asterisk | asterisk | 1.4_beta | |
| asterisk | asterisk | a | |
| asterisk | asterisk | b.1.3.2 | |
| asterisk | asterisk | b.1.3.3 | |
| asterisk | asterisk | b.2.2.0 | |
| asterisk | asterisk_appliance_developer_kit | * | |
| asterisk | asterisknow | beta_5 | |
| asterisk | asterisknow | beta_6 | |
| asterisk | s800i_appliance | 1.0 | |
| asterisk | s800i_appliance | 1.0.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "54F50B72-EFB3-448F-A2B8-C2BE4D4BF341",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "69BE50A7-FCA8-470A-B212-A516224306EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E306F943-ECA2-41C8-8C5D-F6A3D68ECE79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "3C309D90-24ED-4DC7-A770-783A7E28705F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "1B6DFD0D-86CE-4423-A0F4-C3581F916038",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "77255177-4EB2-47F5-8B3A-F6164C3C8173",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "2145ECD7-D734-4D58-8474-2F38DF9DB94F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "38C3AAB7-EA93-40BA-8ADE-380DA3520747",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta1:*:*:*:*:*:*:*",
"matchCriteriaId": "E97310AF-E163-4C4F-A0BE-2940A67C336B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta2:*:*:*:*:*:*:*",
"matchCriteriaId": "66A7A018-4EB6-4C15-9A22-E4299A6919C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A7A7F90E-4600-4058-BB10-E39BE8F4968F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5722AD0B-B329-4DA3-A251-A18DD6EE505E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "18B8E66C-B2EB-4F1F-9226-07A957885D8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "ECD3CBC1-1371-440A-9EA1-7495A4FA2C49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "1B4841AD-96B7-4518-AC3E-3D23C88C083B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C89A173C-C64A-440F-BCC6-EDE692521171",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "C716CAB8-5F2D-44DA-982B-3A47B3B59A1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F0FABB45-93A9-49BB-93DA-D13305E2FF84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "A5F82331-A7C1-4166-AE45-A83BD7FC3D25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "26A10E99-3A8C-430A-8FB6-4A55E01A00E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "E5DF84B2-A104-4FA2-8B02-D243D76ACEE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "B4BA2270-DF93-48FB-A90F-DFBFED05F051",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "B4FE0264-95E4-4B75-8904-369035DEA2F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "593AA737-5AF3-4F7C-B74B-D3F37701C435",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D942B911-979A-4AC3-93D6-07E420171E77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.4_2007-04-27:*:*:*:*:*:*:*",
"matchCriteriaId": "465DB1C7-D5DD-4A2D-8506-8642AB8363C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*",
"matchCriteriaId": "181C8E98-2138-4BFC-B6B0-1DA270AEE7F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:a:*:business:*:*:*:*:*",
"matchCriteriaId": "C6702046-43CF-4C84-9F76-24716C9F7D20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.2:*:business:*:*:*:*:*",
"matchCriteriaId": "524CF00B-1B36-4C1F-80B4-28349891669B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.3:*:business:*:*:*:*:*",
"matchCriteriaId": "2942FA48-42CE-4E67-A5BF-7852652EDE28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk:b.2.2.0:*:business:*:*:*:*:*",
"matchCriteriaId": "4160A834-9194-474C-819B-60627E470D13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6C150564-406F-4B49-AEF8-0F2887738E4D",
"versionEndIncluding": "0.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:*",
"matchCriteriaId": "B12A09BE-1EE0-46D5-B3F0-E8847409A49A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:*",
"matchCriteriaId": "7A5A734E-1DD3-4924-8AC1-97048FA3270F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9282AC42-E98A-4BC2-B46D-15B5776C961F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "83DBFD69-2500-46C1-827C-1493CF896F49",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Skinny channel driver (chan_skinny) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a certain data length value in a crafted packet, which results in an \"overly large memcpy.\""
},
{
"lang": "es",
"value": "El controlador de canal Skinny (chan_skinny) en Asterisk anterior a 1.2.22 y 1.4.x anterior a 1.4.8, Business Edition anterior a B.2.2.1, AsteriskNOW anterior a la beta7, Appliance Developer Kit anterior a 0.5.0, y s800i anterior a 1.0.2 permite a atacantes remotos provocar denegaci\u00f3n de servicio (caida) a trav\u00e9s de ciertos valores de longitudes de datos en un paquete manipulado, lo cual deriva en un \"copia de memoria demasiado larga\"."
}
],
"id": "CVE-2007-3764",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-07-18T17:30:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=185713"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://ftp.digium.com/pub/asa/ASA-2007-016.pdf"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/26099"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/29051"
},
{
"source": "cve@mitre.org",
"url": "http://security.gentoo.org/glsa/glsa-200802-11.xml"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2007/dsa-1358"
},
{
"source": "cve@mitre.org",
"url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/24950"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1018407"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/2563"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35478"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=185713"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://ftp.digium.com/pub/asa/ASA-2007-016.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/26099"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/29051"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200802-11.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2007/dsa-1358"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/24950"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1018407"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/2563"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35478"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2008-3264 (GCVE-0-2008-3264)
Vulnerability from cvelistv5 – Published: 2008-07-24 15:18 – Updated: 2024-08-07 09:28
VLAI?
Summary
The FWDOWNL firmware-download implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (traffic amplification) via an IAX2 FWDOWNL request.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T09:28:41.869Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1020536",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020536"
},
{
"name": "GLSA-200905-01",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200905-01.xml"
},
{
"name": "31194",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31194"
},
{
"name": "ADV-2008-2168",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2168/references"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://downloads.digium.com/pub/security/AST-2008-011.html"
},
{
"name": "FEDORA-2008-6676",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html"
},
{
"name": "31178",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31178"
},
{
"name": "asterisk-downloadprotocol-dos(43955)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43955"
},
{
"name": "30350",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/30350"
},
{
"name": "20080722 AST-2008-011: Traffic amplification in IAX2 firmware provisioning system",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/494676/100/0/threaded"
},
{
"name": "34982",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34982"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-07-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The FWDOWNL firmware-download implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (traffic amplification) via an IAX2 FWDOWNL request."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-11T19:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "1020536",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020536"
},
{
"name": "GLSA-200905-01",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200905-01.xml"
},
{
"name": "31194",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31194"
},
{
"name": "ADV-2008-2168",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2168/references"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://downloads.digium.com/pub/security/AST-2008-011.html"
},
{
"name": "FEDORA-2008-6676",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html"
},
{
"name": "31178",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31178"
},
{
"name": "asterisk-downloadprotocol-dos(43955)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43955"
},
{
"name": "30350",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/30350"
},
{
"name": "20080722 AST-2008-011: Traffic amplification in IAX2 firmware provisioning system",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/494676/100/0/threaded"
},
{
"name": "34982",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34982"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-3264",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The FWDOWNL firmware-download implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (traffic amplification) via an IAX2 FWDOWNL request."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1020536",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020536"
},
{
"name": "GLSA-200905-01",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200905-01.xml"
},
{
"name": "31194",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31194"
},
{
"name": "ADV-2008-2168",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2168/references"
},
{
"name": "http://downloads.digium.com/pub/security/AST-2008-011.html",
"refsource": "CONFIRM",
"url": "http://downloads.digium.com/pub/security/AST-2008-011.html"
},
{
"name": "FEDORA-2008-6676",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html"
},
{
"name": "31178",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31178"
},
{
"name": "asterisk-downloadprotocol-dos(43955)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43955"
},
{
"name": "30350",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30350"
},
{
"name": "20080722 AST-2008-011: Traffic amplification in IAX2 firmware provisioning system",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/494676/100/0/threaded"
},
{
"name": "34982",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34982"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-3264",
"datePublished": "2008-07-24T15:18:00",
"dateReserved": "2008-07-22T00:00:00",
"dateUpdated": "2024-08-07T09:28:41.869Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-1923 (GCVE-0-2008-1923)
Vulnerability from cvelistv5 – Published: 2008-04-23 16:00 – Updated: 2024-08-07 08:41
VLAI?
Summary
The IAX2 channel driver (chan_iax2) in Asterisk 1.2 before revision 72630 and 1.4 before revision 65679, when configured to allow unauthenticated calls, sends "early audio" to an unverified source IP address of a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed NEW message.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:41:00.169Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "asterisk-new-dos(42049)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42049"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://downloads.digium.com/pub/security/AST-2008-006.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://bugs.digium.com/view.php?id=10078"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.altsci.com/concepts/page.php?s=asteri\u0026p=1"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-04-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The IAX2 channel driver (chan_iax2) in Asterisk 1.2 before revision 72630 and 1.4 before revision 65679, when configured to allow unauthenticated calls, sends \"early audio\" to an unverified source IP address of a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed NEW message."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-07T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "asterisk-new-dos(42049)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42049"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://downloads.digium.com/pub/security/AST-2008-006.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://bugs.digium.com/view.php?id=10078"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.altsci.com/concepts/page.php?s=asteri\u0026p=1"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-1923",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The IAX2 channel driver (chan_iax2) in Asterisk 1.2 before revision 72630 and 1.4 before revision 65679, when configured to allow unauthenticated calls, sends \"early audio\" to an unverified source IP address of a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed NEW message."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "asterisk-new-dos(42049)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42049"
},
{
"name": "http://downloads.digium.com/pub/security/AST-2008-006.html",
"refsource": "CONFIRM",
"url": "http://downloads.digium.com/pub/security/AST-2008-006.html"
},
{
"name": "http://bugs.digium.com/view.php?id=10078",
"refsource": "CONFIRM",
"url": "http://bugs.digium.com/view.php?id=10078"
},
{
"name": "http://www.altsci.com/concepts/page.php?s=asteri\u0026p=1",
"refsource": "MISC",
"url": "http://www.altsci.com/concepts/page.php?s=asteri\u0026p=1"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-1923",
"datePublished": "2008-04-23T16:00:00",
"dateReserved": "2008-04-23T00:00:00",
"dateUpdated": "2024-08-07T08:41:00.169Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-1897 (GCVE-0-2008-1897)
Vulnerability from cvelistv5 – Published: 2008-04-23 00:00 – Updated: 2024-08-07 08:40
VLAI?
Summary
The IAX2 channel driver (chan_iax2) in Asterisk Open Source 1.0.x, 1.2.x before 1.2.28, and 1.4.x before 1.4.19.1; Business Edition A.x.x, B.x.x before B.2.5.2, and C.x.x before C.1.8.1; AsteriskNOW before 1.0.3; Appliance Developer Kit 0.x.x; and s800i before 1.1.0.3, when configured to allow unauthenticated calls, does not verify that an ACK response contains a call number matching the server's reply to a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed ACK response that does not complete a 3-way handshake. NOTE: this issue exists because of an incomplete fix for CVE-2008-1923.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:40:59.845Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "GLSA-200905-01",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200905-01.xml"
},
{
"name": "29927",
"tags": [
"third-party-advisory",
"x_transferred"
],
"url": "http://secunia.com/advisories/29927"
},
{
"name": "asterisk-iax2protocol-ack-dos(41966)",
"tags": [
"vdb-entry",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41966"
},
{
"name": "28901",
"tags": [
"vdb-entry",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/28901"
},
{
"name": "30010",
"tags": [
"third-party-advisory",
"x_transferred"
],
"url": "http://secunia.com/advisories/30010"
},
{
"name": "ADV-2008-1324",
"tags": [
"vdb-entry",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/1324"
},
{
"tags": [
"x_transferred"
],
"url": "http://downloads.digium.com/pub/security/AST-2008-006.html"
},
{
"tags": [
"x_transferred"
],
"url": "http://bugs.digium.com/view.php?id=10078"
},
{
"name": "FEDORA-2008-3390",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00600.html"
},
{
"name": "20080422 AST-2008-006 - 3-way handshake in IAX2 incomplete",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/491220/100/0/threaded"
},
{
"tags": [
"x_transferred"
],
"url": "http://www.altsci.com/concepts/page.php?s=asteri\u0026p=2"
},
{
"name": "30042",
"tags": [
"third-party-advisory",
"x_transferred"
],
"url": "http://secunia.com/advisories/30042"
},
{
"name": "DSA-1563",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://www.debian.org/security/2008/dsa-1563"
},
{
"name": "34982",
"tags": [
"third-party-advisory",
"x_transferred"
],
"url": "http://secunia.com/advisories/34982"
},
{
"name": "1019918",
"tags": [
"vdb-entry",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1019918"
},
{
"name": "FEDORA-2008-3365",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00581.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://downloads.asterisk.org/pub/security/AST-2008-006.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/xrg/asterisk-xrg/commit/51714a24347dc57f9a208a4a8af84115ef407b83"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/jcollie/asterisk/commit/a8b180875b037b8da26f6a3bcc8e5e98b8c904d2"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/xrg/asterisk-xrg/commit/10da3dab24e8ca08cf2c983f8d0206e383535b5a"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/jcollie/asterisk/commit/771b3d8749b34b6eea4e03a2e514380da9582f90"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/pruiz/asterisk/commit/e0ef9bd22810c6969a7f222eec04798f19a7e2d6"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/jcollie/asterisk/commit/60de4fbbdf3ede49f158e23a9e3b679f2e519c1e"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/mojolingo/asterisk/commit/20ac3662f137dbf7f42d5295590069a7d3b1166b"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/silentindark/asterisk-1/commit/fe8b7f31db687f8b9992864b82c93d22833019c7"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/kaoru6/asterisk/commit/1fe14f38dd43dc894d21f85762b51208ba5c8acb"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/lyx2014/Asterisk/commit/0670e43c30135044e25cca7f80e1833e2c128653"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-04-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The IAX2 channel driver (chan_iax2) in Asterisk Open Source 1.0.x, 1.2.x before 1.2.28, and 1.4.x before 1.4.19.1; Business Edition A.x.x, B.x.x before B.2.5.2, and C.x.x before C.1.8.1; AsteriskNOW before 1.0.3; Appliance Developer Kit 0.x.x; and s800i before 1.1.0.3, when configured to allow unauthenticated calls, does not verify that an ACK response contains a call number matching the server\u0027s reply to a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed ACK response that does not complete a 3-way handshake. NOTE: this issue exists because of an incomplete fix for CVE-2008-1923."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-10-20T02:02:11.362982",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "GLSA-200905-01",
"tags": [
"vendor-advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-200905-01.xml"
},
{
"name": "29927",
"tags": [
"third-party-advisory"
],
"url": "http://secunia.com/advisories/29927"
},
{
"name": "asterisk-iax2protocol-ack-dos(41966)",
"tags": [
"vdb-entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41966"
},
{
"name": "28901",
"tags": [
"vdb-entry"
],
"url": "http://www.securityfocus.com/bid/28901"
},
{
"name": "30010",
"tags": [
"third-party-advisory"
],
"url": "http://secunia.com/advisories/30010"
},
{
"name": "ADV-2008-1324",
"tags": [
"vdb-entry"
],
"url": "http://www.vupen.com/english/advisories/2008/1324"
},
{
"url": "http://downloads.digium.com/pub/security/AST-2008-006.html"
},
{
"url": "http://bugs.digium.com/view.php?id=10078"
},
{
"name": "FEDORA-2008-3390",
"tags": [
"vendor-advisory"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00600.html"
},
{
"name": "20080422 AST-2008-006 - 3-way handshake in IAX2 incomplete",
"tags": [
"mailing-list"
],
"url": "http://www.securityfocus.com/archive/1/491220/100/0/threaded"
},
{
"url": "http://www.altsci.com/concepts/page.php?s=asteri\u0026p=2"
},
{
"name": "30042",
"tags": [
"third-party-advisory"
],
"url": "http://secunia.com/advisories/30042"
},
{
"name": "DSA-1563",
"tags": [
"vendor-advisory"
],
"url": "http://www.debian.org/security/2008/dsa-1563"
},
{
"name": "34982",
"tags": [
"third-party-advisory"
],
"url": "http://secunia.com/advisories/34982"
},
{
"name": "1019918",
"tags": [
"vdb-entry"
],
"url": "http://www.securitytracker.com/id?1019918"
},
{
"name": "FEDORA-2008-3365",
"tags": [
"vendor-advisory"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00581.html"
},
{
"url": "https://downloads.asterisk.org/pub/security/AST-2008-006.html"
},
{
"url": "https://github.com/xrg/asterisk-xrg/commit/51714a24347dc57f9a208a4a8af84115ef407b83"
},
{
"url": "https://github.com/jcollie/asterisk/commit/a8b180875b037b8da26f6a3bcc8e5e98b8c904d2"
},
{
"url": "https://github.com/xrg/asterisk-xrg/commit/10da3dab24e8ca08cf2c983f8d0206e383535b5a"
},
{
"url": "https://github.com/jcollie/asterisk/commit/771b3d8749b34b6eea4e03a2e514380da9582f90"
},
{
"url": "https://github.com/pruiz/asterisk/commit/e0ef9bd22810c6969a7f222eec04798f19a7e2d6"
},
{
"url": "https://github.com/jcollie/asterisk/commit/60de4fbbdf3ede49f158e23a9e3b679f2e519c1e"
},
{
"url": "https://github.com/mojolingo/asterisk/commit/20ac3662f137dbf7f42d5295590069a7d3b1166b"
},
{
"url": "https://github.com/silentindark/asterisk-1/commit/fe8b7f31db687f8b9992864b82c93d22833019c7"
},
{
"url": "https://github.com/kaoru6/asterisk/commit/1fe14f38dd43dc894d21f85762b51208ba5c8acb"
},
{
"url": "https://github.com/lyx2014/Asterisk/commit/0670e43c30135044e25cca7f80e1833e2c128653"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-1897",
"datePublished": "2008-04-23T00:00:00",
"dateReserved": "2008-04-20T00:00:00",
"dateUpdated": "2024-08-07T08:40:59.845Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-1289 (GCVE-0-2008-1289)
Vulnerability from cvelistv5 – Published: 2008-03-24 17:00 – Updated: 2024-08-07 08:17
VLAI?
Summary
Multiple buffer overflows in Asterisk Open Source 1.4.x before 1.4.18.1 and 1.4.19-rc3, Open Source 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6.1, AsteriskNOW 1.0.x before 1.0.2, Appliance Developer Kit before 1.4 revision 109386, and s800i 1.1.x before 1.1.0.2 allow remote attackers to (1) write a zero to an arbitrary memory location via a large RTP payload number, related to the ast_rtp_unset_m_type function in main/rtp.c; or (2) write certain integers to an arbitrary memory location via a large number of RTP payloads, related to the process_sdp function in channels/chan_sip.c.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:17:34.571Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "28308",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/28308"
},
{
"name": "3763",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/3763"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://labs.musecurity.com/advisories/MU-200803-01.txt"
},
{
"name": "asterisk-rtp-codecpayload-bo(41305)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41305"
},
{
"name": "1019628",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1019628"
},
{
"name": "29426",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29426"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.asterisk.org/node/48466"
},
{
"name": "FEDORA-2008-2554",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
},
{
"name": "20080318 AST-2008-002: Two buffer overflows in RTP Codec Payload Handling",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/489817/100/0/threaded"
},
{
"name": "ADV-2008-0928",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/0928"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://downloads.digium.com/pub/security/AST-2008-002.html"
},
{
"name": "FEDORA-2008-2620",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
},
{
"name": "asterisk-rtppayload-bo(41302)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41302"
},
{
"name": "29470",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29470"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-03-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple buffer overflows in Asterisk Open Source 1.4.x before 1.4.18.1 and 1.4.19-rc3, Open Source 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6.1, AsteriskNOW 1.0.x before 1.0.2, Appliance Developer Kit before 1.4 revision 109386, and s800i 1.1.x before 1.1.0.2 allow remote attackers to (1) write a zero to an arbitrary memory location via a large RTP payload number, related to the ast_rtp_unset_m_type function in main/rtp.c; or (2) write certain integers to an arbitrary memory location via a large number of RTP payloads, related to the process_sdp function in channels/chan_sip.c."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-11T19:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "28308",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/28308"
},
{
"name": "3763",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/3763"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://labs.musecurity.com/advisories/MU-200803-01.txt"
},
{
"name": "asterisk-rtp-codecpayload-bo(41305)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41305"
},
{
"name": "1019628",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1019628"
},
{
"name": "29426",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29426"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.asterisk.org/node/48466"
},
{
"name": "FEDORA-2008-2554",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
},
{
"name": "20080318 AST-2008-002: Two buffer overflows in RTP Codec Payload Handling",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/489817/100/0/threaded"
},
{
"name": "ADV-2008-0928",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/0928"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://downloads.digium.com/pub/security/AST-2008-002.html"
},
{
"name": "FEDORA-2008-2620",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
},
{
"name": "asterisk-rtppayload-bo(41302)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41302"
},
{
"name": "29470",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29470"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-1289",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple buffer overflows in Asterisk Open Source 1.4.x before 1.4.18.1 and 1.4.19-rc3, Open Source 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6.1, AsteriskNOW 1.0.x before 1.0.2, Appliance Developer Kit before 1.4 revision 109386, and s800i 1.1.x before 1.1.0.2 allow remote attackers to (1) write a zero to an arbitrary memory location via a large RTP payload number, related to the ast_rtp_unset_m_type function in main/rtp.c; or (2) write certain integers to an arbitrary memory location via a large number of RTP payloads, related to the process_sdp function in channels/chan_sip.c."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "28308",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28308"
},
{
"name": "3763",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3763"
},
{
"name": "http://labs.musecurity.com/advisories/MU-200803-01.txt",
"refsource": "MISC",
"url": "http://labs.musecurity.com/advisories/MU-200803-01.txt"
},
{
"name": "asterisk-rtp-codecpayload-bo(41305)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41305"
},
{
"name": "1019628",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1019628"
},
{
"name": "29426",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29426"
},
{
"name": "http://www.asterisk.org/node/48466",
"refsource": "CONFIRM",
"url": "http://www.asterisk.org/node/48466"
},
{
"name": "FEDORA-2008-2554",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
},
{
"name": "20080318 AST-2008-002: Two buffer overflows in RTP Codec Payload Handling",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/489817/100/0/threaded"
},
{
"name": "ADV-2008-0928",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0928"
},
{
"name": "http://downloads.digium.com/pub/security/AST-2008-002.html",
"refsource": "CONFIRM",
"url": "http://downloads.digium.com/pub/security/AST-2008-002.html"
},
{
"name": "FEDORA-2008-2620",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
},
{
"name": "asterisk-rtppayload-bo(41302)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41302"
},
{
"name": "29470",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29470"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-1289",
"datePublished": "2008-03-24T17:00:00",
"dateReserved": "2008-03-12T00:00:00",
"dateUpdated": "2024-08-07T08:17:34.571Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-1390 (GCVE-0-2008-1390)
Vulnerability from cvelistv5 – Published: 2008-03-24 17:00 – Updated: 2024-08-07 08:17
VLAI?
Summary
The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:17:34.588Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "3764",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/3764"
},
{
"name": "28316",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/28316"
},
{
"name": "20080318 AST-2008-005: HTTP Manager ID is predictable",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/489819/100/0/threaded"
},
{
"name": "asterisk-httpmanagerid-weak-security(41304)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41304"
},
{
"name": "29449",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29449"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://downloads.digium.com/pub/security/AST-2008-005.html"
},
{
"name": "FEDORA-2008-2554",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
},
{
"name": "1019679",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1019679"
},
{
"name": "FEDORA-2008-2620",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
},
{
"name": "29470",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29470"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-03-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-11T19:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "3764",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/3764"
},
{
"name": "28316",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/28316"
},
{
"name": "20080318 AST-2008-005: HTTP Manager ID is predictable",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/489819/100/0/threaded"
},
{
"name": "asterisk-httpmanagerid-weak-security(41304)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41304"
},
{
"name": "29449",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29449"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://downloads.digium.com/pub/security/AST-2008-005.html"
},
{
"name": "FEDORA-2008-2554",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
},
{
"name": "1019679",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1019679"
},
{
"name": "FEDORA-2008-2620",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
},
{
"name": "29470",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29470"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-1390",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "3764",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3764"
},
{
"name": "28316",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28316"
},
{
"name": "20080318 AST-2008-005: HTTP Manager ID is predictable",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/489819/100/0/threaded"
},
{
"name": "asterisk-httpmanagerid-weak-security(41304)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41304"
},
{
"name": "29449",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29449"
},
{
"name": "http://downloads.digium.com/pub/security/AST-2008-005.html",
"refsource": "CONFIRM",
"url": "http://downloads.digium.com/pub/security/AST-2008-005.html"
},
{
"name": "FEDORA-2008-2554",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
},
{
"name": "1019679",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019679"
},
{
"name": "FEDORA-2008-2620",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
},
{
"name": "29470",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29470"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-1390",
"datePublished": "2008-03-24T17:00:00",
"dateReserved": "2008-03-18T00:00:00",
"dateUpdated": "2024-08-07T08:17:34.588Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-1332 (GCVE-0-2008-1332)
Vulnerability from cvelistv5 – Published: 2008-03-20 00:00 – Updated: 2024-08-07 08:17
VLAI?
Summary
Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:17:34.472Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "SUSE-SR:2008:010",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html"
},
{
"name": "29782",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29782"
},
{
"name": "GLSA-200804-13",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200804-13.xml"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://downloads.digium.com/pub/security/AST-2008-003.html"
},
{
"name": "28310",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/28310"
},
{
"name": "20080318 AST-2008-003: Unauthenticated calls allowed from SIP channel driver",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/489818/100/0/threaded"
},
{
"name": "DSA-1525",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2008/dsa-1525"
},
{
"name": "29426",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29426"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.asterisk.org/node/48466"
},
{
"name": "FEDORA-2008-2554",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
},
{
"name": "1019629",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1019629"
},
{
"name": "asterisk-sip-security-bypass(41308)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41308"
},
{
"name": "ADV-2008-0928",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/0928"
},
{
"name": "FEDORA-2008-2620",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
},
{
"name": "29957",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29957"
},
{
"name": "29456",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29456"
},
{
"name": "29470",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29470"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-03-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-11T19:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "SUSE-SR:2008:010",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html"
},
{
"name": "29782",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29782"
},
{
"name": "GLSA-200804-13",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200804-13.xml"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://downloads.digium.com/pub/security/AST-2008-003.html"
},
{
"name": "28310",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/28310"
},
{
"name": "20080318 AST-2008-003: Unauthenticated calls allowed from SIP channel driver",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/489818/100/0/threaded"
},
{
"name": "DSA-1525",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2008/dsa-1525"
},
{
"name": "29426",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29426"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.asterisk.org/node/48466"
},
{
"name": "FEDORA-2008-2554",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
},
{
"name": "1019629",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1019629"
},
{
"name": "asterisk-sip-security-bypass(41308)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41308"
},
{
"name": "ADV-2008-0928",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/0928"
},
{
"name": "FEDORA-2008-2620",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
},
{
"name": "29957",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29957"
},
{
"name": "29456",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29456"
},
{
"name": "29470",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29470"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-1332",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "SUSE-SR:2008:010",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html"
},
{
"name": "29782",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29782"
},
{
"name": "GLSA-200804-13",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200804-13.xml"
},
{
"name": "http://downloads.digium.com/pub/security/AST-2008-003.html",
"refsource": "CONFIRM",
"url": "http://downloads.digium.com/pub/security/AST-2008-003.html"
},
{
"name": "28310",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28310"
},
{
"name": "20080318 AST-2008-003: Unauthenticated calls allowed from SIP channel driver",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/489818/100/0/threaded"
},
{
"name": "DSA-1525",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1525"
},
{
"name": "29426",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29426"
},
{
"name": "http://www.asterisk.org/node/48466",
"refsource": "CONFIRM",
"url": "http://www.asterisk.org/node/48466"
},
{
"name": "FEDORA-2008-2554",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
},
{
"name": "1019629",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1019629"
},
{
"name": "asterisk-sip-security-bypass(41308)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41308"
},
{
"name": "ADV-2008-0928",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0928"
},
{
"name": "FEDORA-2008-2620",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
},
{
"name": "29957",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29957"
},
{
"name": "29456",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29456"
},
{
"name": "29470",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29470"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-1332",
"datePublished": "2008-03-20T00:00:00",
"dateReserved": "2008-03-13T00:00:00",
"dateUpdated": "2024-08-07T08:17:34.472Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-0095 (GCVE-0-2008-0095)
Vulnerability from cvelistv5 – Published: 2008-01-08 02:00 – Updated: 2024-08-07 07:32
VLAI?
Summary
The SIP channel driver in Asterisk Open Source 1.4.x before 1.4.17, Business Edition before C.1.0-beta8, AsteriskNOW before beta7, Appliance Developer Kit before Asterisk 1.4 revision 95946, and Appliance s800i 1.0.x before 1.0.3.4 allows remote attackers to cause a denial of service (daemon crash) via a BYE message with an Also (Also transfer) header, which triggers a NULL pointer dereference.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T07:32:23.897Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "27110",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/27110"
},
{
"name": "FEDORA-2008-0199",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00167.html"
},
{
"name": "ADV-2008-0019",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/0019"
},
{
"name": "20080102 AST-2008-001: Crash from transfer using BYE with Also header",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/485727/100/0/threaded"
},
{
"name": "asterisk-bye-also-dos(39361)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39361"
},
{
"name": "3520",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/3520"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://bugs.digium.com/view.php?id=11637"
},
{
"name": "28312",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28312"
},
{
"name": "1019152",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1019152"
},
{
"name": "FEDORA-2008-0198",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00166.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://downloads.digium.com/pub/security/AST-2008-001.html"
},
{
"name": "28299",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28299"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-01-02T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The SIP channel driver in Asterisk Open Source 1.4.x before 1.4.17, Business Edition before C.1.0-beta8, AsteriskNOW before beta7, Appliance Developer Kit before Asterisk 1.4 revision 95946, and Appliance s800i 1.0.x before 1.0.3.4 allows remote attackers to cause a denial of service (daemon crash) via a BYE message with an Also (Also transfer) header, which triggers a NULL pointer dereference."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-15T20:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "27110",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/27110"
},
{
"name": "FEDORA-2008-0199",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00167.html"
},
{
"name": "ADV-2008-0019",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/0019"
},
{
"name": "20080102 AST-2008-001: Crash from transfer using BYE with Also header",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/485727/100/0/threaded"
},
{
"name": "asterisk-bye-also-dos(39361)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39361"
},
{
"name": "3520",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/3520"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://bugs.digium.com/view.php?id=11637"
},
{
"name": "28312",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28312"
},
{
"name": "1019152",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1019152"
},
{
"name": "FEDORA-2008-0198",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00166.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://downloads.digium.com/pub/security/AST-2008-001.html"
},
{
"name": "28299",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28299"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-0095",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The SIP channel driver in Asterisk Open Source 1.4.x before 1.4.17, Business Edition before C.1.0-beta8, AsteriskNOW before beta7, Appliance Developer Kit before Asterisk 1.4 revision 95946, and Appliance s800i 1.0.x before 1.0.3.4 allows remote attackers to cause a denial of service (daemon crash) via a BYE message with an Also (Also transfer) header, which triggers a NULL pointer dereference."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "27110",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27110"
},
{
"name": "FEDORA-2008-0199",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00167.html"
},
{
"name": "ADV-2008-0019",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0019"
},
{
"name": "20080102 AST-2008-001: Crash from transfer using BYE with Also header",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/485727/100/0/threaded"
},
{
"name": "asterisk-bye-also-dos(39361)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39361"
},
{
"name": "3520",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3520"
},
{
"name": "http://bugs.digium.com/view.php?id=11637",
"refsource": "MISC",
"url": "http://bugs.digium.com/view.php?id=11637"
},
{
"name": "28312",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28312"
},
{
"name": "1019152",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019152"
},
{
"name": "FEDORA-2008-0198",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00166.html"
},
{
"name": "http://downloads.digium.com/pub/security/AST-2008-001.html",
"refsource": "CONFIRM",
"url": "http://downloads.digium.com/pub/security/AST-2008-001.html"
},
{
"name": "28299",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28299"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-0095",
"datePublished": "2008-01-08T02:00:00",
"dateReserved": "2008-01-07T00:00:00",
"dateUpdated": "2024-08-07T07:32:23.897Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-4455 (GCVE-0-2007-4455)
Vulnerability from cvelistv5 – Published: 2007-08-22 01:00 – Updated: 2024-08-07 14:53
VLAI?
Summary
The SIP channel driver (chan_sip) in Asterisk Open Source 1.4.x before 1.4.11, AsteriskNOW before beta7, Asterisk Appliance Developer Kit 0.x before 0.8.0, and s800i (Asterisk Appliance) 1.x before 1.0.3 allows remote attackers to cause a denial of service (memory exhaustion) via a SIP dialog that causes a large number of history entries to be created.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T14:53:55.958Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "3047",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/3047"
},
{
"name": "ADV-2007-2953",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/2953"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://downloads.digium.com/pub/asa/AST-2007-020.html"
},
{
"name": "25392",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/25392"
},
{
"name": "20070821 AST-2007-020: Resource Exhaustion Vulnerability in Asterisk SIP channel driver",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2007/Aug/0393.html"
},
{
"name": "asterisk-sip-dialoghistory-dos(36145)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36145"
},
{
"name": "26553",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26553"
},
{
"name": "1018595",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1018595"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-08-21T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The SIP channel driver (chan_sip) in Asterisk Open Source 1.4.x before 1.4.11, AsteriskNOW before beta7, Asterisk Appliance Developer Kit 0.x before 0.8.0, and s800i (Asterisk Appliance) 1.x before 1.0.3 allows remote attackers to cause a denial of service (memory exhaustion) via a SIP dialog that causes a large number of history entries to be created."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "3047",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/3047"
},
{
"name": "ADV-2007-2953",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/2953"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://downloads.digium.com/pub/asa/AST-2007-020.html"
},
{
"name": "25392",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/25392"
},
{
"name": "20070821 AST-2007-020: Resource Exhaustion Vulnerability in Asterisk SIP channel driver",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2007/Aug/0393.html"
},
{
"name": "asterisk-sip-dialoghistory-dos(36145)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36145"
},
{
"name": "26553",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26553"
},
{
"name": "1018595",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1018595"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-4455",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The SIP channel driver (chan_sip) in Asterisk Open Source 1.4.x before 1.4.11, AsteriskNOW before beta7, Asterisk Appliance Developer Kit 0.x before 0.8.0, and s800i (Asterisk Appliance) 1.x before 1.0.3 allows remote attackers to cause a denial of service (memory exhaustion) via a SIP dialog that causes a large number of history entries to be created."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "3047",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3047"
},
{
"name": "ADV-2007-2953",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2953"
},
{
"name": "http://downloads.digium.com/pub/asa/AST-2007-020.html",
"refsource": "CONFIRM",
"url": "http://downloads.digium.com/pub/asa/AST-2007-020.html"
},
{
"name": "25392",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25392"
},
{
"name": "20070821 AST-2007-020: Resource Exhaustion Vulnerability in Asterisk SIP channel driver",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2007/Aug/0393.html"
},
{
"name": "asterisk-sip-dialoghistory-dos(36145)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36145"
},
{
"name": "26553",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26553"
},
{
"name": "1018595",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018595"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-4455",
"datePublished": "2007-08-22T01:00:00",
"dateReserved": "2007-08-21T00:00:00",
"dateUpdated": "2024-08-07T14:53:55.958Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-4280 (GCVE-0-2007-4280)
Vulnerability from cvelistv5 – Published: 2007-08-09 21:00 – Updated: 2024-08-07 14:46
VLAI?
Summary
The Skinny channel driver (chan_skinny) in Asterisk Open Source before 1.4.10, AsteriskNOW before beta7, Appliance Developer Kit before 0.7.0, and Appliance s800i before 1.0.3 allows remote authenticated users to cause a denial of service (application crash) via a CAPABILITIES_RES_MESSAGE packet with a capabilities count larger than the capabilities_res_message array population.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T14:46:39.690Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2007-2808",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/2808"
},
{
"name": "26340",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26340"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://downloads.digium.com/pub/asa/ASA-2007-019.pdf"
},
{
"name": "asterisk-skinny-channel-dos(35870)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35870"
},
{
"name": "25228",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/25228"
},
{
"name": "1018536",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1018536"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-08-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Skinny channel driver (chan_skinny) in Asterisk Open Source before 1.4.10, AsteriskNOW before beta7, Appliance Developer Kit before 0.7.0, and Appliance s800i before 1.0.3 allows remote authenticated users to cause a denial of service (application crash) via a CAPABILITIES_RES_MESSAGE packet with a capabilities count larger than the capabilities_res_message array population."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2007-2808",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/2808"
},
{
"name": "26340",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26340"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://downloads.digium.com/pub/asa/ASA-2007-019.pdf"
},
{
"name": "asterisk-skinny-channel-dos(35870)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35870"
},
{
"name": "25228",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/25228"
},
{
"name": "1018536",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1018536"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-4280",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Skinny channel driver (chan_skinny) in Asterisk Open Source before 1.4.10, AsteriskNOW before beta7, Appliance Developer Kit before 0.7.0, and Appliance s800i before 1.0.3 allows remote authenticated users to cause a denial of service (application crash) via a CAPABILITIES_RES_MESSAGE packet with a capabilities count larger than the capabilities_res_message array population."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2007-2808",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2808"
},
{
"name": "26340",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26340"
},
{
"name": "http://downloads.digium.com/pub/asa/ASA-2007-019.pdf",
"refsource": "CONFIRM",
"url": "http://downloads.digium.com/pub/asa/ASA-2007-019.pdf"
},
{
"name": "asterisk-skinny-channel-dos(35870)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35870"
},
{
"name": "25228",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25228"
},
{
"name": "1018536",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018536"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-4280",
"datePublished": "2007-08-09T21:00:00",
"dateReserved": "2007-08-09T00:00:00",
"dateUpdated": "2024-08-07T14:46:39.690Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-3264 (GCVE-0-2008-3264)
Vulnerability from nvd – Published: 2008-07-24 15:18 – Updated: 2024-08-07 09:28
VLAI?
Summary
The FWDOWNL firmware-download implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (traffic amplification) via an IAX2 FWDOWNL request.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T09:28:41.869Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1020536",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020536"
},
{
"name": "GLSA-200905-01",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200905-01.xml"
},
{
"name": "31194",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31194"
},
{
"name": "ADV-2008-2168",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2168/references"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://downloads.digium.com/pub/security/AST-2008-011.html"
},
{
"name": "FEDORA-2008-6676",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html"
},
{
"name": "31178",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31178"
},
{
"name": "asterisk-downloadprotocol-dos(43955)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43955"
},
{
"name": "30350",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/30350"
},
{
"name": "20080722 AST-2008-011: Traffic amplification in IAX2 firmware provisioning system",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/494676/100/0/threaded"
},
{
"name": "34982",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34982"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-07-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The FWDOWNL firmware-download implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (traffic amplification) via an IAX2 FWDOWNL request."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-11T19:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "1020536",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020536"
},
{
"name": "GLSA-200905-01",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200905-01.xml"
},
{
"name": "31194",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31194"
},
{
"name": "ADV-2008-2168",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2168/references"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://downloads.digium.com/pub/security/AST-2008-011.html"
},
{
"name": "FEDORA-2008-6676",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html"
},
{
"name": "31178",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31178"
},
{
"name": "asterisk-downloadprotocol-dos(43955)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43955"
},
{
"name": "30350",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/30350"
},
{
"name": "20080722 AST-2008-011: Traffic amplification in IAX2 firmware provisioning system",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/494676/100/0/threaded"
},
{
"name": "34982",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34982"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-3264",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The FWDOWNL firmware-download implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (traffic amplification) via an IAX2 FWDOWNL request."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1020536",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020536"
},
{
"name": "GLSA-200905-01",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200905-01.xml"
},
{
"name": "31194",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31194"
},
{
"name": "ADV-2008-2168",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2168/references"
},
{
"name": "http://downloads.digium.com/pub/security/AST-2008-011.html",
"refsource": "CONFIRM",
"url": "http://downloads.digium.com/pub/security/AST-2008-011.html"
},
{
"name": "FEDORA-2008-6676",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html"
},
{
"name": "31178",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31178"
},
{
"name": "asterisk-downloadprotocol-dos(43955)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43955"
},
{
"name": "30350",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30350"
},
{
"name": "20080722 AST-2008-011: Traffic amplification in IAX2 firmware provisioning system",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/494676/100/0/threaded"
},
{
"name": "34982",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34982"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-3264",
"datePublished": "2008-07-24T15:18:00",
"dateReserved": "2008-07-22T00:00:00",
"dateUpdated": "2024-08-07T09:28:41.869Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-1923 (GCVE-0-2008-1923)
Vulnerability from nvd – Published: 2008-04-23 16:00 – Updated: 2024-08-07 08:41
VLAI?
Summary
The IAX2 channel driver (chan_iax2) in Asterisk 1.2 before revision 72630 and 1.4 before revision 65679, when configured to allow unauthenticated calls, sends "early audio" to an unverified source IP address of a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed NEW message.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:41:00.169Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "asterisk-new-dos(42049)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42049"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://downloads.digium.com/pub/security/AST-2008-006.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://bugs.digium.com/view.php?id=10078"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.altsci.com/concepts/page.php?s=asteri\u0026p=1"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-04-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The IAX2 channel driver (chan_iax2) in Asterisk 1.2 before revision 72630 and 1.4 before revision 65679, when configured to allow unauthenticated calls, sends \"early audio\" to an unverified source IP address of a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed NEW message."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-07T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "asterisk-new-dos(42049)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42049"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://downloads.digium.com/pub/security/AST-2008-006.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://bugs.digium.com/view.php?id=10078"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.altsci.com/concepts/page.php?s=asteri\u0026p=1"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-1923",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The IAX2 channel driver (chan_iax2) in Asterisk 1.2 before revision 72630 and 1.4 before revision 65679, when configured to allow unauthenticated calls, sends \"early audio\" to an unverified source IP address of a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed NEW message."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "asterisk-new-dos(42049)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42049"
},
{
"name": "http://downloads.digium.com/pub/security/AST-2008-006.html",
"refsource": "CONFIRM",
"url": "http://downloads.digium.com/pub/security/AST-2008-006.html"
},
{
"name": "http://bugs.digium.com/view.php?id=10078",
"refsource": "CONFIRM",
"url": "http://bugs.digium.com/view.php?id=10078"
},
{
"name": "http://www.altsci.com/concepts/page.php?s=asteri\u0026p=1",
"refsource": "MISC",
"url": "http://www.altsci.com/concepts/page.php?s=asteri\u0026p=1"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-1923",
"datePublished": "2008-04-23T16:00:00",
"dateReserved": "2008-04-23T00:00:00",
"dateUpdated": "2024-08-07T08:41:00.169Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-1897 (GCVE-0-2008-1897)
Vulnerability from nvd – Published: 2008-04-23 00:00 – Updated: 2024-08-07 08:40
VLAI?
Summary
The IAX2 channel driver (chan_iax2) in Asterisk Open Source 1.0.x, 1.2.x before 1.2.28, and 1.4.x before 1.4.19.1; Business Edition A.x.x, B.x.x before B.2.5.2, and C.x.x before C.1.8.1; AsteriskNOW before 1.0.3; Appliance Developer Kit 0.x.x; and s800i before 1.1.0.3, when configured to allow unauthenticated calls, does not verify that an ACK response contains a call number matching the server's reply to a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed ACK response that does not complete a 3-way handshake. NOTE: this issue exists because of an incomplete fix for CVE-2008-1923.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:40:59.845Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "GLSA-200905-01",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200905-01.xml"
},
{
"name": "29927",
"tags": [
"third-party-advisory",
"x_transferred"
],
"url": "http://secunia.com/advisories/29927"
},
{
"name": "asterisk-iax2protocol-ack-dos(41966)",
"tags": [
"vdb-entry",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41966"
},
{
"name": "28901",
"tags": [
"vdb-entry",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/28901"
},
{
"name": "30010",
"tags": [
"third-party-advisory",
"x_transferred"
],
"url": "http://secunia.com/advisories/30010"
},
{
"name": "ADV-2008-1324",
"tags": [
"vdb-entry",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/1324"
},
{
"tags": [
"x_transferred"
],
"url": "http://downloads.digium.com/pub/security/AST-2008-006.html"
},
{
"tags": [
"x_transferred"
],
"url": "http://bugs.digium.com/view.php?id=10078"
},
{
"name": "FEDORA-2008-3390",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00600.html"
},
{
"name": "20080422 AST-2008-006 - 3-way handshake in IAX2 incomplete",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/491220/100/0/threaded"
},
{
"tags": [
"x_transferred"
],
"url": "http://www.altsci.com/concepts/page.php?s=asteri\u0026p=2"
},
{
"name": "30042",
"tags": [
"third-party-advisory",
"x_transferred"
],
"url": "http://secunia.com/advisories/30042"
},
{
"name": "DSA-1563",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://www.debian.org/security/2008/dsa-1563"
},
{
"name": "34982",
"tags": [
"third-party-advisory",
"x_transferred"
],
"url": "http://secunia.com/advisories/34982"
},
{
"name": "1019918",
"tags": [
"vdb-entry",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1019918"
},
{
"name": "FEDORA-2008-3365",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00581.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://downloads.asterisk.org/pub/security/AST-2008-006.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/xrg/asterisk-xrg/commit/51714a24347dc57f9a208a4a8af84115ef407b83"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/jcollie/asterisk/commit/a8b180875b037b8da26f6a3bcc8e5e98b8c904d2"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/xrg/asterisk-xrg/commit/10da3dab24e8ca08cf2c983f8d0206e383535b5a"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/jcollie/asterisk/commit/771b3d8749b34b6eea4e03a2e514380da9582f90"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/pruiz/asterisk/commit/e0ef9bd22810c6969a7f222eec04798f19a7e2d6"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/jcollie/asterisk/commit/60de4fbbdf3ede49f158e23a9e3b679f2e519c1e"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/mojolingo/asterisk/commit/20ac3662f137dbf7f42d5295590069a7d3b1166b"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/silentindark/asterisk-1/commit/fe8b7f31db687f8b9992864b82c93d22833019c7"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/kaoru6/asterisk/commit/1fe14f38dd43dc894d21f85762b51208ba5c8acb"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/lyx2014/Asterisk/commit/0670e43c30135044e25cca7f80e1833e2c128653"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-04-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The IAX2 channel driver (chan_iax2) in Asterisk Open Source 1.0.x, 1.2.x before 1.2.28, and 1.4.x before 1.4.19.1; Business Edition A.x.x, B.x.x before B.2.5.2, and C.x.x before C.1.8.1; AsteriskNOW before 1.0.3; Appliance Developer Kit 0.x.x; and s800i before 1.1.0.3, when configured to allow unauthenticated calls, does not verify that an ACK response contains a call number matching the server\u0027s reply to a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed ACK response that does not complete a 3-way handshake. NOTE: this issue exists because of an incomplete fix for CVE-2008-1923."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-10-20T02:02:11.362982",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "GLSA-200905-01",
"tags": [
"vendor-advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-200905-01.xml"
},
{
"name": "29927",
"tags": [
"third-party-advisory"
],
"url": "http://secunia.com/advisories/29927"
},
{
"name": "asterisk-iax2protocol-ack-dos(41966)",
"tags": [
"vdb-entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41966"
},
{
"name": "28901",
"tags": [
"vdb-entry"
],
"url": "http://www.securityfocus.com/bid/28901"
},
{
"name": "30010",
"tags": [
"third-party-advisory"
],
"url": "http://secunia.com/advisories/30010"
},
{
"name": "ADV-2008-1324",
"tags": [
"vdb-entry"
],
"url": "http://www.vupen.com/english/advisories/2008/1324"
},
{
"url": "http://downloads.digium.com/pub/security/AST-2008-006.html"
},
{
"url": "http://bugs.digium.com/view.php?id=10078"
},
{
"name": "FEDORA-2008-3390",
"tags": [
"vendor-advisory"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00600.html"
},
{
"name": "20080422 AST-2008-006 - 3-way handshake in IAX2 incomplete",
"tags": [
"mailing-list"
],
"url": "http://www.securityfocus.com/archive/1/491220/100/0/threaded"
},
{
"url": "http://www.altsci.com/concepts/page.php?s=asteri\u0026p=2"
},
{
"name": "30042",
"tags": [
"third-party-advisory"
],
"url": "http://secunia.com/advisories/30042"
},
{
"name": "DSA-1563",
"tags": [
"vendor-advisory"
],
"url": "http://www.debian.org/security/2008/dsa-1563"
},
{
"name": "34982",
"tags": [
"third-party-advisory"
],
"url": "http://secunia.com/advisories/34982"
},
{
"name": "1019918",
"tags": [
"vdb-entry"
],
"url": "http://www.securitytracker.com/id?1019918"
},
{
"name": "FEDORA-2008-3365",
"tags": [
"vendor-advisory"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00581.html"
},
{
"url": "https://downloads.asterisk.org/pub/security/AST-2008-006.html"
},
{
"url": "https://github.com/xrg/asterisk-xrg/commit/51714a24347dc57f9a208a4a8af84115ef407b83"
},
{
"url": "https://github.com/jcollie/asterisk/commit/a8b180875b037b8da26f6a3bcc8e5e98b8c904d2"
},
{
"url": "https://github.com/xrg/asterisk-xrg/commit/10da3dab24e8ca08cf2c983f8d0206e383535b5a"
},
{
"url": "https://github.com/jcollie/asterisk/commit/771b3d8749b34b6eea4e03a2e514380da9582f90"
},
{
"url": "https://github.com/pruiz/asterisk/commit/e0ef9bd22810c6969a7f222eec04798f19a7e2d6"
},
{
"url": "https://github.com/jcollie/asterisk/commit/60de4fbbdf3ede49f158e23a9e3b679f2e519c1e"
},
{
"url": "https://github.com/mojolingo/asterisk/commit/20ac3662f137dbf7f42d5295590069a7d3b1166b"
},
{
"url": "https://github.com/silentindark/asterisk-1/commit/fe8b7f31db687f8b9992864b82c93d22833019c7"
},
{
"url": "https://github.com/kaoru6/asterisk/commit/1fe14f38dd43dc894d21f85762b51208ba5c8acb"
},
{
"url": "https://github.com/lyx2014/Asterisk/commit/0670e43c30135044e25cca7f80e1833e2c128653"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-1897",
"datePublished": "2008-04-23T00:00:00",
"dateReserved": "2008-04-20T00:00:00",
"dateUpdated": "2024-08-07T08:40:59.845Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-1289 (GCVE-0-2008-1289)
Vulnerability from nvd – Published: 2008-03-24 17:00 – Updated: 2024-08-07 08:17
VLAI?
Summary
Multiple buffer overflows in Asterisk Open Source 1.4.x before 1.4.18.1 and 1.4.19-rc3, Open Source 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6.1, AsteriskNOW 1.0.x before 1.0.2, Appliance Developer Kit before 1.4 revision 109386, and s800i 1.1.x before 1.1.0.2 allow remote attackers to (1) write a zero to an arbitrary memory location via a large RTP payload number, related to the ast_rtp_unset_m_type function in main/rtp.c; or (2) write certain integers to an arbitrary memory location via a large number of RTP payloads, related to the process_sdp function in channels/chan_sip.c.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:17:34.571Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "28308",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/28308"
},
{
"name": "3763",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/3763"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://labs.musecurity.com/advisories/MU-200803-01.txt"
},
{
"name": "asterisk-rtp-codecpayload-bo(41305)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41305"
},
{
"name": "1019628",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1019628"
},
{
"name": "29426",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29426"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.asterisk.org/node/48466"
},
{
"name": "FEDORA-2008-2554",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
},
{
"name": "20080318 AST-2008-002: Two buffer overflows in RTP Codec Payload Handling",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/489817/100/0/threaded"
},
{
"name": "ADV-2008-0928",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/0928"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://downloads.digium.com/pub/security/AST-2008-002.html"
},
{
"name": "FEDORA-2008-2620",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
},
{
"name": "asterisk-rtppayload-bo(41302)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41302"
},
{
"name": "29470",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29470"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-03-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple buffer overflows in Asterisk Open Source 1.4.x before 1.4.18.1 and 1.4.19-rc3, Open Source 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6.1, AsteriskNOW 1.0.x before 1.0.2, Appliance Developer Kit before 1.4 revision 109386, and s800i 1.1.x before 1.1.0.2 allow remote attackers to (1) write a zero to an arbitrary memory location via a large RTP payload number, related to the ast_rtp_unset_m_type function in main/rtp.c; or (2) write certain integers to an arbitrary memory location via a large number of RTP payloads, related to the process_sdp function in channels/chan_sip.c."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-11T19:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "28308",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/28308"
},
{
"name": "3763",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/3763"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://labs.musecurity.com/advisories/MU-200803-01.txt"
},
{
"name": "asterisk-rtp-codecpayload-bo(41305)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41305"
},
{
"name": "1019628",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1019628"
},
{
"name": "29426",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29426"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.asterisk.org/node/48466"
},
{
"name": "FEDORA-2008-2554",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
},
{
"name": "20080318 AST-2008-002: Two buffer overflows in RTP Codec Payload Handling",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/489817/100/0/threaded"
},
{
"name": "ADV-2008-0928",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/0928"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://downloads.digium.com/pub/security/AST-2008-002.html"
},
{
"name": "FEDORA-2008-2620",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
},
{
"name": "asterisk-rtppayload-bo(41302)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41302"
},
{
"name": "29470",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29470"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-1289",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple buffer overflows in Asterisk Open Source 1.4.x before 1.4.18.1 and 1.4.19-rc3, Open Source 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6.1, AsteriskNOW 1.0.x before 1.0.2, Appliance Developer Kit before 1.4 revision 109386, and s800i 1.1.x before 1.1.0.2 allow remote attackers to (1) write a zero to an arbitrary memory location via a large RTP payload number, related to the ast_rtp_unset_m_type function in main/rtp.c; or (2) write certain integers to an arbitrary memory location via a large number of RTP payloads, related to the process_sdp function in channels/chan_sip.c."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "28308",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28308"
},
{
"name": "3763",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3763"
},
{
"name": "http://labs.musecurity.com/advisories/MU-200803-01.txt",
"refsource": "MISC",
"url": "http://labs.musecurity.com/advisories/MU-200803-01.txt"
},
{
"name": "asterisk-rtp-codecpayload-bo(41305)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41305"
},
{
"name": "1019628",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1019628"
},
{
"name": "29426",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29426"
},
{
"name": "http://www.asterisk.org/node/48466",
"refsource": "CONFIRM",
"url": "http://www.asterisk.org/node/48466"
},
{
"name": "FEDORA-2008-2554",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
},
{
"name": "20080318 AST-2008-002: Two buffer overflows in RTP Codec Payload Handling",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/489817/100/0/threaded"
},
{
"name": "ADV-2008-0928",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0928"
},
{
"name": "http://downloads.digium.com/pub/security/AST-2008-002.html",
"refsource": "CONFIRM",
"url": "http://downloads.digium.com/pub/security/AST-2008-002.html"
},
{
"name": "FEDORA-2008-2620",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
},
{
"name": "asterisk-rtppayload-bo(41302)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41302"
},
{
"name": "29470",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29470"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-1289",
"datePublished": "2008-03-24T17:00:00",
"dateReserved": "2008-03-12T00:00:00",
"dateUpdated": "2024-08-07T08:17:34.571Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-1390 (GCVE-0-2008-1390)
Vulnerability from nvd – Published: 2008-03-24 17:00 – Updated: 2024-08-07 08:17
VLAI?
Summary
The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:17:34.588Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "3764",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/3764"
},
{
"name": "28316",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/28316"
},
{
"name": "20080318 AST-2008-005: HTTP Manager ID is predictable",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/489819/100/0/threaded"
},
{
"name": "asterisk-httpmanagerid-weak-security(41304)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41304"
},
{
"name": "29449",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29449"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://downloads.digium.com/pub/security/AST-2008-005.html"
},
{
"name": "FEDORA-2008-2554",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
},
{
"name": "1019679",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1019679"
},
{
"name": "FEDORA-2008-2620",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
},
{
"name": "29470",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29470"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-03-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-11T19:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "3764",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/3764"
},
{
"name": "28316",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/28316"
},
{
"name": "20080318 AST-2008-005: HTTP Manager ID is predictable",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/489819/100/0/threaded"
},
{
"name": "asterisk-httpmanagerid-weak-security(41304)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41304"
},
{
"name": "29449",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29449"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://downloads.digium.com/pub/security/AST-2008-005.html"
},
{
"name": "FEDORA-2008-2554",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
},
{
"name": "1019679",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1019679"
},
{
"name": "FEDORA-2008-2620",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
},
{
"name": "29470",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29470"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-1390",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "3764",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3764"
},
{
"name": "28316",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28316"
},
{
"name": "20080318 AST-2008-005: HTTP Manager ID is predictable",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/489819/100/0/threaded"
},
{
"name": "asterisk-httpmanagerid-weak-security(41304)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41304"
},
{
"name": "29449",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29449"
},
{
"name": "http://downloads.digium.com/pub/security/AST-2008-005.html",
"refsource": "CONFIRM",
"url": "http://downloads.digium.com/pub/security/AST-2008-005.html"
},
{
"name": "FEDORA-2008-2554",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
},
{
"name": "1019679",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019679"
},
{
"name": "FEDORA-2008-2620",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
},
{
"name": "29470",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29470"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-1390",
"datePublished": "2008-03-24T17:00:00",
"dateReserved": "2008-03-18T00:00:00",
"dateUpdated": "2024-08-07T08:17:34.588Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-1332 (GCVE-0-2008-1332)
Vulnerability from nvd – Published: 2008-03-20 00:00 – Updated: 2024-08-07 08:17
VLAI?
Summary
Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:17:34.472Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "SUSE-SR:2008:010",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html"
},
{
"name": "29782",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29782"
},
{
"name": "GLSA-200804-13",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200804-13.xml"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://downloads.digium.com/pub/security/AST-2008-003.html"
},
{
"name": "28310",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/28310"
},
{
"name": "20080318 AST-2008-003: Unauthenticated calls allowed from SIP channel driver",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/489818/100/0/threaded"
},
{
"name": "DSA-1525",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2008/dsa-1525"
},
{
"name": "29426",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29426"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.asterisk.org/node/48466"
},
{
"name": "FEDORA-2008-2554",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
},
{
"name": "1019629",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1019629"
},
{
"name": "asterisk-sip-security-bypass(41308)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41308"
},
{
"name": "ADV-2008-0928",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/0928"
},
{
"name": "FEDORA-2008-2620",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
},
{
"name": "29957",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29957"
},
{
"name": "29456",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29456"
},
{
"name": "29470",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29470"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-03-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-11T19:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "SUSE-SR:2008:010",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html"
},
{
"name": "29782",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29782"
},
{
"name": "GLSA-200804-13",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200804-13.xml"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://downloads.digium.com/pub/security/AST-2008-003.html"
},
{
"name": "28310",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/28310"
},
{
"name": "20080318 AST-2008-003: Unauthenticated calls allowed from SIP channel driver",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/489818/100/0/threaded"
},
{
"name": "DSA-1525",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2008/dsa-1525"
},
{
"name": "29426",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29426"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.asterisk.org/node/48466"
},
{
"name": "FEDORA-2008-2554",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
},
{
"name": "1019629",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1019629"
},
{
"name": "asterisk-sip-security-bypass(41308)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41308"
},
{
"name": "ADV-2008-0928",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/0928"
},
{
"name": "FEDORA-2008-2620",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
},
{
"name": "29957",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29957"
},
{
"name": "29456",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29456"
},
{
"name": "29470",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29470"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-1332",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "SUSE-SR:2008:010",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html"
},
{
"name": "29782",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29782"
},
{
"name": "GLSA-200804-13",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200804-13.xml"
},
{
"name": "http://downloads.digium.com/pub/security/AST-2008-003.html",
"refsource": "CONFIRM",
"url": "http://downloads.digium.com/pub/security/AST-2008-003.html"
},
{
"name": "28310",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28310"
},
{
"name": "20080318 AST-2008-003: Unauthenticated calls allowed from SIP channel driver",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/489818/100/0/threaded"
},
{
"name": "DSA-1525",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1525"
},
{
"name": "29426",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29426"
},
{
"name": "http://www.asterisk.org/node/48466",
"refsource": "CONFIRM",
"url": "http://www.asterisk.org/node/48466"
},
{
"name": "FEDORA-2008-2554",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
},
{
"name": "1019629",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1019629"
},
{
"name": "asterisk-sip-security-bypass(41308)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41308"
},
{
"name": "ADV-2008-0928",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0928"
},
{
"name": "FEDORA-2008-2620",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
},
{
"name": "29957",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29957"
},
{
"name": "29456",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29456"
},
{
"name": "29470",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29470"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-1332",
"datePublished": "2008-03-20T00:00:00",
"dateReserved": "2008-03-13T00:00:00",
"dateUpdated": "2024-08-07T08:17:34.472Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-0095 (GCVE-0-2008-0095)
Vulnerability from nvd – Published: 2008-01-08 02:00 – Updated: 2024-08-07 07:32
VLAI?
Summary
The SIP channel driver in Asterisk Open Source 1.4.x before 1.4.17, Business Edition before C.1.0-beta8, AsteriskNOW before beta7, Appliance Developer Kit before Asterisk 1.4 revision 95946, and Appliance s800i 1.0.x before 1.0.3.4 allows remote attackers to cause a denial of service (daemon crash) via a BYE message with an Also (Also transfer) header, which triggers a NULL pointer dereference.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T07:32:23.897Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "27110",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/27110"
},
{
"name": "FEDORA-2008-0199",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00167.html"
},
{
"name": "ADV-2008-0019",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/0019"
},
{
"name": "20080102 AST-2008-001: Crash from transfer using BYE with Also header",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/485727/100/0/threaded"
},
{
"name": "asterisk-bye-also-dos(39361)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39361"
},
{
"name": "3520",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/3520"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://bugs.digium.com/view.php?id=11637"
},
{
"name": "28312",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28312"
},
{
"name": "1019152",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1019152"
},
{
"name": "FEDORA-2008-0198",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00166.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://downloads.digium.com/pub/security/AST-2008-001.html"
},
{
"name": "28299",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28299"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-01-02T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The SIP channel driver in Asterisk Open Source 1.4.x before 1.4.17, Business Edition before C.1.0-beta8, AsteriskNOW before beta7, Appliance Developer Kit before Asterisk 1.4 revision 95946, and Appliance s800i 1.0.x before 1.0.3.4 allows remote attackers to cause a denial of service (daemon crash) via a BYE message with an Also (Also transfer) header, which triggers a NULL pointer dereference."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-15T20:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "27110",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/27110"
},
{
"name": "FEDORA-2008-0199",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00167.html"
},
{
"name": "ADV-2008-0019",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/0019"
},
{
"name": "20080102 AST-2008-001: Crash from transfer using BYE with Also header",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/485727/100/0/threaded"
},
{
"name": "asterisk-bye-also-dos(39361)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39361"
},
{
"name": "3520",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/3520"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://bugs.digium.com/view.php?id=11637"
},
{
"name": "28312",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28312"
},
{
"name": "1019152",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1019152"
},
{
"name": "FEDORA-2008-0198",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00166.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://downloads.digium.com/pub/security/AST-2008-001.html"
},
{
"name": "28299",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28299"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-0095",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The SIP channel driver in Asterisk Open Source 1.4.x before 1.4.17, Business Edition before C.1.0-beta8, AsteriskNOW before beta7, Appliance Developer Kit before Asterisk 1.4 revision 95946, and Appliance s800i 1.0.x before 1.0.3.4 allows remote attackers to cause a denial of service (daemon crash) via a BYE message with an Also (Also transfer) header, which triggers a NULL pointer dereference."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "27110",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27110"
},
{
"name": "FEDORA-2008-0199",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00167.html"
},
{
"name": "ADV-2008-0019",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0019"
},
{
"name": "20080102 AST-2008-001: Crash from transfer using BYE with Also header",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/485727/100/0/threaded"
},
{
"name": "asterisk-bye-also-dos(39361)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39361"
},
{
"name": "3520",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3520"
},
{
"name": "http://bugs.digium.com/view.php?id=11637",
"refsource": "MISC",
"url": "http://bugs.digium.com/view.php?id=11637"
},
{
"name": "28312",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28312"
},
{
"name": "1019152",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019152"
},
{
"name": "FEDORA-2008-0198",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00166.html"
},
{
"name": "http://downloads.digium.com/pub/security/AST-2008-001.html",
"refsource": "CONFIRM",
"url": "http://downloads.digium.com/pub/security/AST-2008-001.html"
},
{
"name": "28299",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28299"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-0095",
"datePublished": "2008-01-08T02:00:00",
"dateReserved": "2008-01-07T00:00:00",
"dateUpdated": "2024-08-07T07:32:23.897Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-4455 (GCVE-0-2007-4455)
Vulnerability from nvd – Published: 2007-08-22 01:00 – Updated: 2024-08-07 14:53
VLAI?
Summary
The SIP channel driver (chan_sip) in Asterisk Open Source 1.4.x before 1.4.11, AsteriskNOW before beta7, Asterisk Appliance Developer Kit 0.x before 0.8.0, and s800i (Asterisk Appliance) 1.x before 1.0.3 allows remote attackers to cause a denial of service (memory exhaustion) via a SIP dialog that causes a large number of history entries to be created.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T14:53:55.958Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "3047",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/3047"
},
{
"name": "ADV-2007-2953",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/2953"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://downloads.digium.com/pub/asa/AST-2007-020.html"
},
{
"name": "25392",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/25392"
},
{
"name": "20070821 AST-2007-020: Resource Exhaustion Vulnerability in Asterisk SIP channel driver",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2007/Aug/0393.html"
},
{
"name": "asterisk-sip-dialoghistory-dos(36145)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36145"
},
{
"name": "26553",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26553"
},
{
"name": "1018595",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1018595"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-08-21T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The SIP channel driver (chan_sip) in Asterisk Open Source 1.4.x before 1.4.11, AsteriskNOW before beta7, Asterisk Appliance Developer Kit 0.x before 0.8.0, and s800i (Asterisk Appliance) 1.x before 1.0.3 allows remote attackers to cause a denial of service (memory exhaustion) via a SIP dialog that causes a large number of history entries to be created."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "3047",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/3047"
},
{
"name": "ADV-2007-2953",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/2953"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://downloads.digium.com/pub/asa/AST-2007-020.html"
},
{
"name": "25392",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/25392"
},
{
"name": "20070821 AST-2007-020: Resource Exhaustion Vulnerability in Asterisk SIP channel driver",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2007/Aug/0393.html"
},
{
"name": "asterisk-sip-dialoghistory-dos(36145)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36145"
},
{
"name": "26553",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26553"
},
{
"name": "1018595",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1018595"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-4455",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The SIP channel driver (chan_sip) in Asterisk Open Source 1.4.x before 1.4.11, AsteriskNOW before beta7, Asterisk Appliance Developer Kit 0.x before 0.8.0, and s800i (Asterisk Appliance) 1.x before 1.0.3 allows remote attackers to cause a denial of service (memory exhaustion) via a SIP dialog that causes a large number of history entries to be created."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "3047",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3047"
},
{
"name": "ADV-2007-2953",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2953"
},
{
"name": "http://downloads.digium.com/pub/asa/AST-2007-020.html",
"refsource": "CONFIRM",
"url": "http://downloads.digium.com/pub/asa/AST-2007-020.html"
},
{
"name": "25392",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25392"
},
{
"name": "20070821 AST-2007-020: Resource Exhaustion Vulnerability in Asterisk SIP channel driver",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2007/Aug/0393.html"
},
{
"name": "asterisk-sip-dialoghistory-dos(36145)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36145"
},
{
"name": "26553",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26553"
},
{
"name": "1018595",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018595"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-4455",
"datePublished": "2007-08-22T01:00:00",
"dateReserved": "2007-08-21T00:00:00",
"dateUpdated": "2024-08-07T14:53:55.958Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-4280 (GCVE-0-2007-4280)
Vulnerability from nvd – Published: 2007-08-09 21:00 – Updated: 2024-08-07 14:46
VLAI?
Summary
The Skinny channel driver (chan_skinny) in Asterisk Open Source before 1.4.10, AsteriskNOW before beta7, Appliance Developer Kit before 0.7.0, and Appliance s800i before 1.0.3 allows remote authenticated users to cause a denial of service (application crash) via a CAPABILITIES_RES_MESSAGE packet with a capabilities count larger than the capabilities_res_message array population.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T14:46:39.690Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2007-2808",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/2808"
},
{
"name": "26340",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26340"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://downloads.digium.com/pub/asa/ASA-2007-019.pdf"
},
{
"name": "asterisk-skinny-channel-dos(35870)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35870"
},
{
"name": "25228",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/25228"
},
{
"name": "1018536",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1018536"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-08-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Skinny channel driver (chan_skinny) in Asterisk Open Source before 1.4.10, AsteriskNOW before beta7, Appliance Developer Kit before 0.7.0, and Appliance s800i before 1.0.3 allows remote authenticated users to cause a denial of service (application crash) via a CAPABILITIES_RES_MESSAGE packet with a capabilities count larger than the capabilities_res_message array population."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2007-2808",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/2808"
},
{
"name": "26340",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26340"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://downloads.digium.com/pub/asa/ASA-2007-019.pdf"
},
{
"name": "asterisk-skinny-channel-dos(35870)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35870"
},
{
"name": "25228",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/25228"
},
{
"name": "1018536",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1018536"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-4280",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Skinny channel driver (chan_skinny) in Asterisk Open Source before 1.4.10, AsteriskNOW before beta7, Appliance Developer Kit before 0.7.0, and Appliance s800i before 1.0.3 allows remote authenticated users to cause a denial of service (application crash) via a CAPABILITIES_RES_MESSAGE packet with a capabilities count larger than the capabilities_res_message array population."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2007-2808",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2808"
},
{
"name": "26340",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26340"
},
{
"name": "http://downloads.digium.com/pub/asa/ASA-2007-019.pdf",
"refsource": "CONFIRM",
"url": "http://downloads.digium.com/pub/asa/ASA-2007-019.pdf"
},
{
"name": "asterisk-skinny-channel-dos(35870)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35870"
},
{
"name": "25228",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25228"
},
{
"name": "1018536",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018536"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-4280",
"datePublished": "2007-08-09T21:00:00",
"dateReserved": "2007-08-09T00:00:00",
"dateUpdated": "2024-08-07T14:46:39.690Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}