Vulnerabilites related to asterisk - asterisk
CVE-2025-49832 (GCVE-0-2025-49832)
Vulnerability from cvelistv5
Published
2025-08-01 17:57
Modified
2025-08-01 18:29
CWE
  • CWE-476 - NULL Pointer Dereference
Summary
Asterisk is an open source private branch exchange and telephony toolkit. In versions up to and including 18.26.2, between 20.00.0 and 20.15.0, 20.7-cert6, 21.00.0, 22.00.0 through 22.5.0, there is a remote DoS and possible RCE condition in `asterisk/res/res_stir_shaken /verification.c` that can be exploited when an attacker can set an arbitrary Identity header, or STIR/SHAKEN is enabled, with verification set in the SIP profile associated with the endpoint to be attacked. This is fixed in versions 18.26.3, 20.7-cert6, 20.15.1, 21.10.1 and 22.5.1.
Impacted products
Vendor Product Version
asterisk asterisk Version: < 18.26.3
Version: >= 20.00.0, < 20.15.1
Version: >= 21.00.0, < 21.10.1
Version: >= 22.00.0, < 22.5.1
Version: >= 20.7-cert6, < 20.7-cert7
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-49832",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-01T18:28:56.826749Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-01T18:29:18.330Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "asterisk",
          "vendor": "asterisk",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 18.26.3"
            },
            {
              "status": "affected",
              "version": "\u003e= 20.00.0, \u003c 20.15.1"
            },
            {
              "status": "affected",
              "version": "\u003e= 21.00.0, \u003c 21.10.1"
            },
            {
              "status": "affected",
              "version": "\u003e= 22.00.0, \u003c 22.5.1"
            },
            {
              "status": "affected",
              "version": "\u003e= 20.7-cert6, \u003c 20.7-cert7"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Asterisk is an open source private branch exchange and telephony toolkit. In versions up to and including 18.26.2, between 20.00.0 and 20.15.0, 20.7-cert6, 21.00.0, 22.00.0 through 22.5.0, there is a remote DoS and possible RCE condition in `asterisk/res/res_stir_shaken /verification.c` that can be exploited when an attacker can set an arbitrary Identity header, or STIR/SHAKEN is enabled, with verification set in the SIP profile associated with the endpoint to be attacked. This is fixed in versions 18.26.3, 20.7-cert6, 20.15.1, 21.10.1 and 22.5.1."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-476",
              "description": "CWE-476: NULL Pointer Dereference",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-01T17:57:29.933Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-mrq5-74j5-f5cr",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-mrq5-74j5-f5cr"
        }
      ],
      "source": {
        "advisory": "GHSA-mrq5-74j5-f5cr",
        "discovery": "UNKNOWN"
      },
      "title": "Asterisk is Vulnerable to Remote DoS and possible RCE Attacks During Memory Allocation"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2025-49832",
    "datePublished": "2025-08-01T17:57:29.933Z",
    "dateReserved": "2025-06-11T14:33:57.799Z",
    "dateUpdated": "2025-08-01T18:29:18.330Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-35190 (GCVE-0-2024-35190)
Vulnerability from cvelistv5
Published
2024-05-17 16:55
Modified
2024-08-02 03:07
CWE
  • CWE-303 - Incorrect Implementation of Authentication Algorithm
  • CWE-480 - Use of Incorrect Operator
  • CWE-670 - Always-Incorrect Control Flow Implementation
Summary
Asterisk is an open source private branch exchange and telephony toolkit. After upgrade to 18.23.0, ALL unauthorized SIP requests are identified as PJSIP Endpoint of local asterisk server. This vulnerability is fixed in 18.23.1, 20.8.1, and 21.3.1.
Impacted products
Vendor Product Version
asterisk asterisk Version: = 21.3.0
Version: = 20.8.0
Version: = 18.23.0
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:asterisk:asterisk:21.3.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "asterisk",
            "vendor": "asterisk",
            "versions": [
              {
                "status": "affected",
                "version": "21.3.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:asterisk:asterisk:20.8.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "asterisk",
            "vendor": "asterisk",
            "versions": [
              {
                "status": "affected",
                "version": "20.8.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:asterisk:asterisk:18.23.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "asterisk",
            "vendor": "asterisk",
            "versions": [
              {
                "status": "affected",
                "version": "18.23.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-35190",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-17T19:33:53.154042Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-24T15:28:38.260Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T03:07:46.821Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-qqxj-v78h-hrf9",
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-qqxj-v78h-hrf9"
          },
          {
            "name": "https://github.com/asterisk/asterisk/pull/600",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/asterisk/asterisk/pull/600"
          },
          {
            "name": "https://github.com/asterisk/asterisk/pull/602",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/asterisk/asterisk/pull/602"
          },
          {
            "name": "https://github.com/asterisk/asterisk/commit/85241bd22936cc15760fd1f65d16c98be7aeaf6d",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/asterisk/asterisk/commit/85241bd22936cc15760fd1f65d16c98be7aeaf6d"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "asterisk",
          "vendor": "asterisk",
          "versions": [
            {
              "status": "affected",
              "version": "= 21.3.0"
            },
            {
              "status": "affected",
              "version": "= 20.8.0"
            },
            {
              "status": "affected",
              "version": "= 18.23.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Asterisk is an open source private branch exchange and telephony toolkit. After upgrade to 18.23.0, ALL unauthorized SIP requests are identified as PJSIP Endpoint of local asterisk server. This vulnerability is fixed in 18.23.1, 20.8.1, and 21.3.1.\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-303",
              "description": "CWE-303: Incorrect Implementation of Authentication Algorithm",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-480",
              "description": "CWE-480: Use of Incorrect Operator",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-670",
              "description": "CWE-670: Always-Incorrect Control Flow Implementation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-17T16:55:41.346Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-qqxj-v78h-hrf9",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-qqxj-v78h-hrf9"
        },
        {
          "name": "https://github.com/asterisk/asterisk/pull/600",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/asterisk/asterisk/pull/600"
        },
        {
          "name": "https://github.com/asterisk/asterisk/pull/602",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/asterisk/asterisk/pull/602"
        },
        {
          "name": "https://github.com/asterisk/asterisk/commit/85241bd22936cc15760fd1f65d16c98be7aeaf6d",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/asterisk/asterisk/commit/85241bd22936cc15760fd1f65d16c98be7aeaf6d"
        }
      ],
      "source": {
        "advisory": "GHSA-qqxj-v78h-hrf9",
        "discovery": "UNKNOWN"
      },
      "title": "Asterisk\u0027 res_pjsip_endpoint_identifier_ip: wrongly matches ALL unauthorized SIP requests"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2024-35190",
    "datePublished": "2024-05-17T16:55:41.346Z",
    "dateReserved": "2024-05-10T14:24:24.341Z",
    "dateUpdated": "2024-08-02T03:07:46.821Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-47779 (GCVE-0-2025-47779)
Vulnerability from cvelistv5
Published
2025-05-22 16:54
Modified
2025-05-22 17:26
CWE
  • CWE-140 - Improper Neutralization of Delimiters
  • CWE-792 - Incomplete Filtering of One or More Instances of Special Elements
Summary
Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk, SIP requests of the type MESSAGE (RFC 3428) authentication do not get proper alignment. An authenticated attacker can spoof any user identity to send spam messages to the user with their authorization token. Abuse of this security issue allows authenticated attackers to send fake chat messages can be spoofed to appear to come from trusted entities. Even administrators who follow Security best practices and Security Considerations can be impacted. Therefore, abuse can lead to spam and enable social engineering, phishing and similar attacks. Versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk fix the issue.
Impacted products
Vendor Product Version
asterisk asterisk Version: < 18.9-cert14
Version: >= 18.10, < 18.26.2
Version: >= 20.0, < 20.7-cert5
Version: >= 20.8, < 20.14.1
Version: >= 21.0, < 21.9.1
Version: >= 22.0, < 22.4.1
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-47779",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-22T17:25:58.891881Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-22T17:26:57.260Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "asterisk",
          "vendor": "asterisk",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 18.9-cert14"
            },
            {
              "status": "affected",
              "version": "\u003e= 18.10, \u003c 18.26.2"
            },
            {
              "status": "affected",
              "version": "\u003e= 20.0, \u003c 20.7-cert5"
            },
            {
              "status": "affected",
              "version": "\u003e= 20.8, \u003c 20.14.1"
            },
            {
              "status": "affected",
              "version": "\u003e= 21.0, \u003c 21.9.1"
            },
            {
              "status": "affected",
              "version": "\u003e= 22.0, \u003c 22.4.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk, SIP requests of the type MESSAGE (RFC 3428) authentication do not get proper alignment. An authenticated attacker can spoof any user identity to send spam messages to the user with their authorization token. Abuse of this security issue allows authenticated attackers to send fake chat messages can be spoofed to appear to come from trusted entities. Even administrators who follow Security best practices and Security Considerations can be impacted. Therefore, abuse can lead to spam and enable social engineering, phishing and similar attacks. Versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk fix the issue."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-140",
              "description": "CWE-140: Improper Neutralization of Delimiters",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-792",
              "description": "CWE-792: Incomplete Filtering of One or More Instances of Special Elements",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-22T16:54:26.314Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-2grh-7mhv-fcfw",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-2grh-7mhv-fcfw"
        },
        {
          "name": "https://github.com/asterisk/asterisk/blob/master/configs/samples/pjsip.conf.sample",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/asterisk/asterisk/blob/master/configs/samples/pjsip.conf.sample"
        }
      ],
      "source": {
        "advisory": "GHSA-2grh-7mhv-fcfw",
        "discovery": "UNKNOWN"
      },
      "title": "Using malformed From header can forge identity with \";\" or NULL in name portion"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2025-47779",
    "datePublished": "2025-05-22T16:54:26.314Z",
    "dateReserved": "2025-05-09T19:49:35.620Z",
    "dateUpdated": "2025-05-22T17:26:57.260Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-1595 (GCVE-0-2007-1595)
Vulnerability from cvelistv5
Published
2007-03-22 23:00
Modified
2024-08-07 12:59
Severity ?
CWE
  • n/a
Summary
The Asterisk Extension Language (AEL) in pbx/pbx_ael.c in Asterisk does not properly generate extensions, which allows remote attackers to execute arbitrary extensions and have an unknown impact by specifying an invalid extension in a certain form.
References
http://www.securityfocus.com/bid/23155 vdb-entry, x_refsource_BID
http://svn.digium.com/view/asterisk?rev=59073&view=rev x_refsource_CONFIRM
http://www.novell.com/linux/security/advisories/2007_34_asterisk.html vendor-advisory, x_refsource_SUSE
http://bugs.digium.com/view.php?id=9316 x_refsource_MISC
http://secunia.com/advisories/25582 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/24694 third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/1123 vdb-entry, x_refsource_VUPEN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:59:08.853Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "23155",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/23155"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://svn.digium.com/view/asterisk?rev=59073\u0026view=rev"
          },
          {
            "name": "SUSE-SA:2007:034",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.digium.com/view.php?id=9316"
          },
          {
            "name": "25582",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25582"
          },
          {
            "name": "24694",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24694"
          },
          {
            "name": "ADV-2007-1123",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/1123"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-03-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Asterisk Extension Language (AEL) in pbx/pbx_ael.c in Asterisk does not properly generate extensions, which allows remote attackers to execute arbitrary extensions and have an unknown impact by specifying an invalid extension in a certain form."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-04-12T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "23155",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/23155"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://svn.digium.com/view/asterisk?rev=59073\u0026view=rev"
        },
        {
          "name": "SUSE-SA:2007:034",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.digium.com/view.php?id=9316"
        },
        {
          "name": "25582",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25582"
        },
        {
          "name": "24694",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24694"
        },
        {
          "name": "ADV-2007-1123",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/1123"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-1595",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Asterisk Extension Language (AEL) in pbx/pbx_ael.c in Asterisk does not properly generate extensions, which allows remote attackers to execute arbitrary extensions and have an unknown impact by specifying an invalid extension in a certain form."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "23155",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/23155"
            },
            {
              "name": "http://svn.digium.com/view/asterisk?rev=59073\u0026view=rev",
              "refsource": "CONFIRM",
              "url": "http://svn.digium.com/view/asterisk?rev=59073\u0026view=rev"
            },
            {
              "name": "SUSE-SA:2007:034",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
            },
            {
              "name": "http://bugs.digium.com/view.php?id=9316",
              "refsource": "MISC",
              "url": "http://bugs.digium.com/view.php?id=9316"
            },
            {
              "name": "25582",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25582"
            },
            {
              "name": "24694",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24694"
            },
            {
              "name": "ADV-2007-1123",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/1123"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-1595",
    "datePublished": "2007-03-22T23:00:00",
    "dateReserved": "2007-03-22T00:00:00",
    "dateUpdated": "2024-08-07T12:59:08.853Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-0441 (GCVE-0-2010-0441)
Vulnerability from cvelistv5
Published
2010-02-04 18:00
Modified
2024-08-07 00:52
Severity ?
CWE
  • n/a
Summary
Asterisk Open Source 1.6.0.x before 1.6.0.22, 1.6.1.x before 1.6.1.14, and 1.6.2.x before 1.6.2.2, and Business Edition C.3 before C.3.3.2, allows remote attackers to cause a denial of service (daemon crash) via an SIP T.38 negotiation with an SDP FaxMaxDatagram field that is (1) missing, (2) modified to contain a negative number, or (3) modified to contain a large number.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:52:18.727Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.1.diff"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.asterisk.org/view.php?id=16517"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.asterisk.org/view.php?id=16634"
          },
          {
            "name": "ADV-2010-0289",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/0289"
          },
          {
            "name": "38047",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/38047"
          },
          {
            "name": "39096",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/39096"
          },
          {
            "name": "FEDORA-2010-3724",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037679.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.asterisk.org/view.php?id=16724"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.2.diff"
          },
          {
            "name": "20100202 AST-2010-001: T.38 Remote Crash Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/509327/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.0.diff"
          },
          {
            "name": "38395",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38395"
          },
          {
            "name": "1023532",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1023532"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://downloads.asterisk.org/pub/security/AST-2010-001.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-02-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Asterisk Open Source 1.6.0.x before 1.6.0.22, 1.6.1.x before 1.6.1.14, and 1.6.2.x before 1.6.2.2, and Business Edition C.3 before C.3.3.2, allows remote attackers to cause a denial of service (daemon crash) via an SIP T.38 negotiation with an SDP FaxMaxDatagram field that is (1) missing, (2) modified to contain a negative number, or (3) modified to contain a large number."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.1.diff"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.asterisk.org/view.php?id=16517"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.asterisk.org/view.php?id=16634"
        },
        {
          "name": "ADV-2010-0289",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/0289"
        },
        {
          "name": "38047",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/38047"
        },
        {
          "name": "39096",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/39096"
        },
        {
          "name": "FEDORA-2010-3724",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037679.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.asterisk.org/view.php?id=16724"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.2.diff"
        },
        {
          "name": "20100202 AST-2010-001: T.38 Remote Crash Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/509327/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.0.diff"
        },
        {
          "name": "38395",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38395"
        },
        {
          "name": "1023532",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1023532"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://downloads.asterisk.org/pub/security/AST-2010-001.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-0441",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Asterisk Open Source 1.6.0.x before 1.6.0.22, 1.6.1.x before 1.6.1.14, and 1.6.2.x before 1.6.2.2, and Business Edition C.3 before C.3.3.2, allows remote attackers to cause a denial of service (daemon crash) via an SIP T.38 negotiation with an SDP FaxMaxDatagram field that is (1) missing, (2) modified to contain a negative number, or (3) modified to contain a large number."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.1.diff",
              "refsource": "CONFIRM",
              "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.1.diff"
            },
            {
              "name": "https://issues.asterisk.org/view.php?id=16517",
              "refsource": "CONFIRM",
              "url": "https://issues.asterisk.org/view.php?id=16517"
            },
            {
              "name": "https://issues.asterisk.org/view.php?id=16634",
              "refsource": "CONFIRM",
              "url": "https://issues.asterisk.org/view.php?id=16634"
            },
            {
              "name": "ADV-2010-0289",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/0289"
            },
            {
              "name": "38047",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/38047"
            },
            {
              "name": "39096",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/39096"
            },
            {
              "name": "FEDORA-2010-3724",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037679.html"
            },
            {
              "name": "https://issues.asterisk.org/view.php?id=16724",
              "refsource": "CONFIRM",
              "url": "https://issues.asterisk.org/view.php?id=16724"
            },
            {
              "name": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.2.diff",
              "refsource": "CONFIRM",
              "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.2.diff"
            },
            {
              "name": "20100202 AST-2010-001: T.38 Remote Crash Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/509327/100/0/threaded"
            },
            {
              "name": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.0.diff",
              "refsource": "CONFIRM",
              "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.0.diff"
            },
            {
              "name": "38395",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/38395"
            },
            {
              "name": "1023532",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1023532"
            },
            {
              "name": "http://downloads.asterisk.org/pub/security/AST-2010-001.html",
              "refsource": "CONFIRM",
              "url": "http://downloads.asterisk.org/pub/security/AST-2010-001.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-0441",
    "datePublished": "2010-02-04T18:00:00",
    "dateReserved": "2010-01-27T00:00:00",
    "dateUpdated": "2024-08-07T00:52:18.727Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-1594 (GCVE-0-2007-1594)
Vulnerability from cvelistv5
Published
2007-03-22 23:00
Modified
2024-08-07 12:59
Severity ?
CWE
  • n/a
Summary
The handle_response function in chan_sip.c in Asterisk before 1.2.17 and 1.4.x before 1.4.2 allows remote attackers to cause a denial of service (crash) via a SIP Response code 0 in a SIP packet.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:59:08.987Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://svn.digium.com/view/asterisk/trunk/channels/chan_sip.c?r1=58907\u0026r2=59038"
          },
          {
            "name": "23093",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/23093"
          },
          {
            "name": "ADV-2007-1077",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/1077"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.digium.com/view.php?id=9313"
          },
          {
            "name": "1017809",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1017809"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.asterisk.org/node/48338"
          },
          {
            "name": "SUSE-SA:2007:034",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
          },
          {
            "name": "20070321 Two new DoS Vulnerabilities in Asterisk Fixed",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/463434/100/0/threaded"
          },
          {
            "name": "24579",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24579"
          },
          {
            "name": "GLSA-200704-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200704-01.xml"
          },
          {
            "name": "25582",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25582"
          },
          {
            "name": "24719",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24719"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sineapps.com/news.php?rssid=1707"
          },
          {
            "name": "[VOIPSEC] 20070319 Asterisk SDP DOS vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-03-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The handle_response function in chan_sip.c in Asterisk before 1.2.17 and 1.4.x before 1.4.2 allows remote attackers to cause a denial of service (crash) via a SIP Response code 0 in a SIP packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://svn.digium.com/view/asterisk/trunk/channels/chan_sip.c?r1=58907\u0026r2=59038"
        },
        {
          "name": "23093",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/23093"
        },
        {
          "name": "ADV-2007-1077",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/1077"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.digium.com/view.php?id=9313"
        },
        {
          "name": "1017809",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1017809"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.asterisk.org/node/48338"
        },
        {
          "name": "SUSE-SA:2007:034",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
        },
        {
          "name": "20070321 Two new DoS Vulnerabilities in Asterisk Fixed",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/463434/100/0/threaded"
        },
        {
          "name": "24579",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24579"
        },
        {
          "name": "GLSA-200704-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200704-01.xml"
        },
        {
          "name": "25582",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25582"
        },
        {
          "name": "24719",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24719"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sineapps.com/news.php?rssid=1707"
        },
        {
          "name": "[VOIPSEC] 20070319 Asterisk SDP DOS vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-1594",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The handle_response function in chan_sip.c in Asterisk before 1.2.17 and 1.4.x before 1.4.2 allows remote attackers to cause a denial of service (crash) via a SIP Response code 0 in a SIP packet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://svn.digium.com/view/asterisk/trunk/channels/chan_sip.c?r1=58907\u0026r2=59038",
              "refsource": "MISC",
              "url": "http://svn.digium.com/view/asterisk/trunk/channels/chan_sip.c?r1=58907\u0026r2=59038"
            },
            {
              "name": "23093",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/23093"
            },
            {
              "name": "ADV-2007-1077",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/1077"
            },
            {
              "name": "http://bugs.digium.com/view.php?id=9313",
              "refsource": "MISC",
              "url": "http://bugs.digium.com/view.php?id=9313"
            },
            {
              "name": "1017809",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1017809"
            },
            {
              "name": "http://www.asterisk.org/node/48338",
              "refsource": "CONFIRM",
              "url": "http://www.asterisk.org/node/48338"
            },
            {
              "name": "SUSE-SA:2007:034",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
            },
            {
              "name": "20070321 Two new DoS Vulnerabilities in Asterisk Fixed",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/463434/100/0/threaded"
            },
            {
              "name": "24579",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24579"
            },
            {
              "name": "GLSA-200704-01",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200704-01.xml"
            },
            {
              "name": "25582",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25582"
            },
            {
              "name": "24719",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24719"
            },
            {
              "name": "http://www.sineapps.com/news.php?rssid=1707",
              "refsource": "CONFIRM",
              "url": "http://www.sineapps.com/news.php?rssid=1707"
            },
            {
              "name": "[VOIPSEC] 20070319 Asterisk SDP DOS vulnerability",
              "refsource": "MLIST",
              "url": "http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-1594",
    "datePublished": "2007-03-22T23:00:00",
    "dateReserved": "2007-03-22T00:00:00",
    "dateUpdated": "2024-08-07T12:59:08.987Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-2293 (GCVE-0-2007-2293)
Vulnerability from cvelistv5
Published
2007-04-26 20:00
Modified
2024-08-07 13:33
Severity ?
CWE
  • n/a
Summary
Multiple stack-based buffer overflows in the process_sdp function in chan_sip.c of the SIP channel T.38 SDP parser in Asterisk before 1.4.3 allow remote attackers to execute arbitrary code via a long (1) T38FaxRateManagement or (2) T38FaxUdpEC SDP parameter in an SIP message, as demonstrated using SIP INVITE.
References
http://www.securityfocus.com/bid/23648 vdb-entry, x_refsource_BID
http://www.osvdb.org/35368 vdb-entry, x_refsource_OSVDB
http://www.vupen.com/english/advisories/2007/1534 vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/archive/1/466883/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/archive/1/472804/100/0/threaded mailing-list, x_refsource_BUGTRAQ
https://exchange.xforce.ibmcloud.com/vulnerabilities/33895 vdb-entry, x_refsource_XF
http://secunia.com/advisories/24977 third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id?1018337 vdb-entry, x_refsource_SECTRACK
http://www.securitytracker.com/id?1017951 vdb-entry, x_refsource_SECTRACK
http://securityreason.com/securityalert/2645 third-party-advisory, x_refsource_SREASON
http://www.asterisk.org/files/ASA-2007-010.pdf x_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T13:33:28.390Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "23648",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/23648"
          },
          {
            "name": "35368",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/35368"
          },
          {
            "name": "ADV-2007-1534",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/1534"
          },
          {
            "name": "20070425 ASA-2007-010: Two stack buffer overflows in SIP channel\u0027s T.38 SDP parsing code",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/466883/100/0/threaded"
          },
          {
            "name": "20070704 Multiple Remote unauthenticated stack overflows in Asterisk chan_sip.c",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/472804/100/0/threaded"
          },
          {
            "name": "asterisk-processsdp-bo(33895)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33895"
          },
          {
            "name": "24977",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24977"
          },
          {
            "name": "1018337",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1018337"
          },
          {
            "name": "1017951",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1017951"
          },
          {
            "name": "2645",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/2645"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.asterisk.org/files/ASA-2007-010.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-04-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple stack-based buffer overflows in the process_sdp function in chan_sip.c of the SIP channel T.38 SDP parser in Asterisk before 1.4.3 allow remote attackers to execute arbitrary code via a long (1) T38FaxRateManagement or (2) T38FaxUdpEC SDP parameter in an SIP message, as demonstrated using SIP INVITE."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "23648",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/23648"
        },
        {
          "name": "35368",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/35368"
        },
        {
          "name": "ADV-2007-1534",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/1534"
        },
        {
          "name": "20070425 ASA-2007-010: Two stack buffer overflows in SIP channel\u0027s T.38 SDP parsing code",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/466883/100/0/threaded"
        },
        {
          "name": "20070704 Multiple Remote unauthenticated stack overflows in Asterisk chan_sip.c",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/472804/100/0/threaded"
        },
        {
          "name": "asterisk-processsdp-bo(33895)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33895"
        },
        {
          "name": "24977",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24977"
        },
        {
          "name": "1018337",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1018337"
        },
        {
          "name": "1017951",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1017951"
        },
        {
          "name": "2645",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/2645"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.asterisk.org/files/ASA-2007-010.pdf"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-2293",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple stack-based buffer overflows in the process_sdp function in chan_sip.c of the SIP channel T.38 SDP parser in Asterisk before 1.4.3 allow remote attackers to execute arbitrary code via a long (1) T38FaxRateManagement or (2) T38FaxUdpEC SDP parameter in an SIP message, as demonstrated using SIP INVITE."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "23648",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/23648"
            },
            {
              "name": "35368",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/35368"
            },
            {
              "name": "ADV-2007-1534",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/1534"
            },
            {
              "name": "20070425 ASA-2007-010: Two stack buffer overflows in SIP channel\u0027s T.38 SDP parsing code",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/466883/100/0/threaded"
            },
            {
              "name": "20070704 Multiple Remote unauthenticated stack overflows in Asterisk chan_sip.c",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/472804/100/0/threaded"
            },
            {
              "name": "asterisk-processsdp-bo(33895)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33895"
            },
            {
              "name": "24977",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24977"
            },
            {
              "name": "1018337",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1018337"
            },
            {
              "name": "1017951",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1017951"
            },
            {
              "name": "2645",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/2645"
            },
            {
              "name": "http://www.asterisk.org/files/ASA-2007-010.pdf",
              "refsource": "CONFIRM",
              "url": "http://www.asterisk.org/files/ASA-2007-010.pdf"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-2293",
    "datePublished": "2007-04-26T20:00:00",
    "dateReserved": "2007-04-26T00:00:00",
    "dateUpdated": "2024-08-07T13:33:28.390Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-3723 (GCVE-0-2009-3723)
Vulnerability from cvelistv5
Published
2019-10-29 12:42
Modified
2024-08-07 06:38
Severity ?
CWE
  • calls allowed on prohibited networks in asterisk
Summary
asterisk allows calls on prohibited networks
Impacted products
Vendor Product Version
asterisk asterisk Version: All 1.6.1 versions
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:38:30.400Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://security-tracker.debian.org/tracker/CVE-2009-3723"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/security/cve/cve-2009-3723"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://downloads.asterisk.org/pub/security/AST-2009-007.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "asterisk",
          "vendor": "asterisk",
          "versions": [
            {
              "status": "affected",
              "version": "All 1.6.1 versions"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "asterisk allows calls on prohibited networks"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "calls allowed on prohibited networks in asterisk",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-10-29T12:42:08",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://security-tracker.debian.org/tracker/CVE-2009-3723"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://access.redhat.com/security/cve/cve-2009-3723"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://downloads.asterisk.org/pub/security/AST-2009-007.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2009-3723",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "asterisk",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "All 1.6.1 versions"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "asterisk"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "asterisk allows calls on prohibited networks"
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "calls allowed on prohibited networks in asterisk"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://security-tracker.debian.org/tracker/CVE-2009-3723",
              "refsource": "MISC",
              "url": "https://security-tracker.debian.org/tracker/CVE-2009-3723"
            },
            {
              "name": "https://access.redhat.com/security/cve/cve-2009-3723",
              "refsource": "MISC",
              "url": "https://access.redhat.com/security/cve/cve-2009-3723"
            },
            {
              "name": "http://downloads.asterisk.org/pub/security/AST-2009-007.html",
              "refsource": "MISC",
              "url": "http://downloads.asterisk.org/pub/security/AST-2009-007.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2009-3723",
    "datePublished": "2019-10-29T12:42:08",
    "dateReserved": "2009-10-16T00:00:00",
    "dateUpdated": "2024-08-07T06:38:30.400Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-49294 (GCVE-0-2023-49294)
Vulnerability from cvelistv5
Published
2023-12-14 19:40
Modified
2025-02-13 17:18
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk prior to 18.9-cert6, it is possible to read any arbitrary file even when the `live_dangerously` is not enabled. This allows arbitrary files to be read. Asterisk versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk prior to 18.9-cert6, contain a fix for this issue.
Impacted products
Vendor Product Version
asterisk asterisk Version: < 18.20.1
Version: >= 19.0.0, < 20.5.1
Version: = 21.0.0
Version: < 18.9-cert6
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T21:53:45.375Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-8857-hfmw-vg8f",
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-8857-hfmw-vg8f"
          },
          {
            "name": "https://github.com/asterisk/asterisk/commit/424be345639d75c6cb7d0bd2da5f0f407dbd0bd5",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/asterisk/asterisk/commit/424be345639d75c6cb7d0bd2da5f0f407dbd0bd5"
          },
          {
            "name": "https://github.com/asterisk/asterisk/blob/master/main/manager.c#L3757",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/asterisk/asterisk/blob/master/main/manager.c#L3757"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "asterisk",
          "vendor": "asterisk",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 18.20.1"
            },
            {
              "status": "affected",
              "version": "\u003e= 19.0.0, \u003c 20.5.1"
            },
            {
              "status": "affected",
              "version": "= 21.0.0"
            },
            {
              "status": "affected",
              "version": "\u003c 18.9-cert6"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk prior to 18.9-cert6, it is possible to read any arbitrary file even when the `live_dangerously` is not enabled. This allows arbitrary files to be read. Asterisk versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk prior to 18.9-cert6, contain a fix for this issue."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-29T00:06:21.896Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-8857-hfmw-vg8f",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-8857-hfmw-vg8f"
        },
        {
          "name": "https://github.com/asterisk/asterisk/commit/424be345639d75c6cb7d0bd2da5f0f407dbd0bd5",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/asterisk/asterisk/commit/424be345639d75c6cb7d0bd2da5f0f407dbd0bd5"
        },
        {
          "name": "https://github.com/asterisk/asterisk/blob/master/main/manager.c#L3757",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/asterisk/asterisk/blob/master/main/manager.c#L3757"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html"
        }
      ],
      "source": {
        "advisory": "GHSA-8857-hfmw-vg8f",
        "discovery": "UNKNOWN"
      },
      "title": "Asterisk Path Traversal vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2023-49294",
    "datePublished": "2023-12-14T19:40:46.157Z",
    "dateReserved": "2023-11-24T16:45:24.314Z",
    "dateUpdated": "2025-02-13T17:18:40.277Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-3764 (GCVE-0-2007-3764)
Vulnerability from cvelistv5
Published
2007-07-18 17:00
Modified
2024-08-07 14:28
Severity ?
CWE
  • n/a
Summary
The Skinny channel driver (chan_skinny) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a certain data length value in a crafted packet, which results in an "overly large memcpy."
References
http://secunia.com/advisories/26099 third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/24950 vdb-entry, x_refsource_BID
http://www.securitytracker.com/id?1018407 vdb-entry, x_refsource_SECTRACK
http://security.gentoo.org/glsa/glsa-200802-11.xml vendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/29051 third-party-advisory, x_refsource_SECUNIA
http://bugs.gentoo.org/show_bug.cgi?id=185713 x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/35478 vdb-entry, x_refsource_XF
http://www.vupen.com/english/advisories/2007/2563 vdb-entry, x_refsource_VUPEN
http://ftp.digium.com/pub/asa/ASA-2007-016.pdf x_refsource_CONFIRM
http://www.debian.org/security/2007/dsa-1358 vendor-advisory, x_refsource_DEBIAN
http://www.novell.com/linux/security/advisories/2007_15_sr.html vendor-advisory, x_refsource_SUSE
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:28:52.239Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "26099",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26099"
          },
          {
            "name": "24950",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/24950"
          },
          {
            "name": "1018407",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1018407"
          },
          {
            "name": "GLSA-200802-11",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml"
          },
          {
            "name": "29051",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29051"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713"
          },
          {
            "name": "asterisk-skinny-driver-dos(35478)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35478"
          },
          {
            "name": "ADV-2007-2563",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/2563"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ftp.digium.com/pub/asa/ASA-2007-016.pdf"
          },
          {
            "name": "DSA-1358",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2007/dsa-1358"
          },
          {
            "name": "SUSE-SR:2007:015",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-07-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Skinny channel driver (chan_skinny) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a certain data length value in a crafted packet, which results in an \"overly large memcpy.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "26099",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26099"
        },
        {
          "name": "24950",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/24950"
        },
        {
          "name": "1018407",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1018407"
        },
        {
          "name": "GLSA-200802-11",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml"
        },
        {
          "name": "29051",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29051"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713"
        },
        {
          "name": "asterisk-skinny-driver-dos(35478)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35478"
        },
        {
          "name": "ADV-2007-2563",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/2563"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ftp.digium.com/pub/asa/ASA-2007-016.pdf"
        },
        {
          "name": "DSA-1358",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2007/dsa-1358"
        },
        {
          "name": "SUSE-SR:2007:015",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-3764",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Skinny channel driver (chan_skinny) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a certain data length value in a crafted packet, which results in an \"overly large memcpy.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "26099",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26099"
            },
            {
              "name": "24950",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/24950"
            },
            {
              "name": "1018407",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1018407"
            },
            {
              "name": "GLSA-200802-11",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml"
            },
            {
              "name": "29051",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29051"
            },
            {
              "name": "http://bugs.gentoo.org/show_bug.cgi?id=185713",
              "refsource": "CONFIRM",
              "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713"
            },
            {
              "name": "asterisk-skinny-driver-dos(35478)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35478"
            },
            {
              "name": "ADV-2007-2563",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/2563"
            },
            {
              "name": "http://ftp.digium.com/pub/asa/ASA-2007-016.pdf",
              "refsource": "CONFIRM",
              "url": "http://ftp.digium.com/pub/asa/ASA-2007-016.pdf"
            },
            {
              "name": "DSA-1358",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2007/dsa-1358"
            },
            {
              "name": "SUSE-SR:2007:015",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-3764",
    "datePublished": "2007-07-18T17:00:00",
    "dateReserved": "2007-07-13T00:00:00",
    "dateUpdated": "2024-08-07T14:28:52.239Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-49786 (GCVE-0-2023-49786)
Vulnerability from cvelistv5
Published
2023-12-14 19:47
Modified
2025-02-13 17:18
CWE
  • CWE-703 - Improper Check or Handling of Exceptional Conditions
Summary
Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versions 18.20.1, 20.5.1, and 21.0.1; as well as certified-asterisk prior to 18.9-cert6; Asterisk is susceptible to a DoS due to a race condition in the hello handshake phase of the DTLS protocol when handling DTLS-SRTP for media setup. This attack can be done continuously, thus denying new DTLS-SRTP encrypted calls during the attack. Abuse of this vulnerability may lead to a massive Denial of Service on vulnerable Asterisk servers for calls that rely on DTLS-SRTP. Commit d7d7764cb07c8a1872804321302ef93bf62cba05 contains a fix, which is part of versions 18.20.1, 20.5.1, 21.0.1, amd 18.9-cert6.
Impacted products
Vendor Product Version
asterisk asterisk Version: < 18.20.1
Version: >= 19.0.0, < 20.5.1
Version: = 21.0.0
Version: < 18.9-cert6
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T22:01:25.997Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-hxj9-xwr8-w8pq",
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-hxj9-xwr8-w8pq"
          },
          {
            "name": "https://github.com/asterisk/asterisk/commit/d7d7764cb07c8a1872804321302ef93bf62cba05",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/asterisk/asterisk/commit/d7d7764cb07c8a1872804321302ef93bf62cba05"
          },
          {
            "name": "https://github.com/EnableSecurity/advisories/tree/master/ES2023-01-asterisk-dtls-hello-race",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/EnableSecurity/advisories/tree/master/ES2023-01-asterisk-dtls-hello-race"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/15/7"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/176251/Asterisk-20.1.0-Denial-Of-Service.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2023/Dec/24"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-49786",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-08T14:19:55.907894Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-08T14:20:19.222Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "asterisk",
          "vendor": "asterisk",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 18.20.1"
            },
            {
              "status": "affected",
              "version": "\u003e= 19.0.0, \u003c 20.5.1"
            },
            {
              "status": "affected",
              "version": "= 21.0.0"
            },
            {
              "status": "affected",
              "version": "\u003c 18.9-cert6"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versions 18.20.1, 20.5.1, and 21.0.1; as well as certified-asterisk prior to 18.9-cert6; Asterisk is susceptible to a DoS due to a race condition in the hello handshake phase of the DTLS protocol when handling DTLS-SRTP for media setup. This attack can be done continuously, thus denying new DTLS-SRTP encrypted calls during the attack. Abuse of this vulnerability may lead to a massive Denial of Service on vulnerable Asterisk servers for calls that rely on DTLS-SRTP. Commit d7d7764cb07c8a1872804321302ef93bf62cba05 contains a fix, which is part of versions 18.20.1, 20.5.1, 21.0.1, amd 18.9-cert6."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-703",
              "description": "CWE-703: Improper Check or Handling of Exceptional Conditions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-29T00:06:18.647Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-hxj9-xwr8-w8pq",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-hxj9-xwr8-w8pq"
        },
        {
          "name": "https://github.com/asterisk/asterisk/commit/d7d7764cb07c8a1872804321302ef93bf62cba05",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/asterisk/asterisk/commit/d7d7764cb07c8a1872804321302ef93bf62cba05"
        },
        {
          "name": "https://github.com/EnableSecurity/advisories/tree/master/ES2023-01-asterisk-dtls-hello-race",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/EnableSecurity/advisories/tree/master/ES2023-01-asterisk-dtls-hello-race"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/12/15/7"
        },
        {
          "url": "http://packetstormsecurity.com/files/176251/Asterisk-20.1.0-Denial-Of-Service.html"
        },
        {
          "url": "http://seclists.org/fulldisclosure/2023/Dec/24"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html"
        }
      ],
      "source": {
        "advisory": "GHSA-hxj9-xwr8-w8pq",
        "discovery": "UNKNOWN"
      },
      "title": "Asterisk susceptible to Denial of Service via DTLS Hello packets during call initiation"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2023-49786",
    "datePublished": "2023-12-14T19:47:46.306Z",
    "dateReserved": "2023-11-30T13:39:50.862Z",
    "dateUpdated": "2025-02-13T17:18:55.224Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-42491 (GCVE-0-2024-42491)
Vulnerability from cvelistv5
Published
2024-09-05 17:17
Modified
2024-09-05 18:52
CWE
Summary
Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.24.3, 20.9.3, and 21.4.3 of Asterisk and versions 18.9-cert12 and 20.7-cert2 of certified-asterisk, if Asterisk attempts to send a SIP request to a URI whose host portion starts with `.1` or `[.1]`, and res_resolver_unbound is loaded, Asterisk will crash with a SEGV. To receive a patch, users should upgrade to one of the following versions: 18.24.3, 20.9.3, 21.4.3, certified-18.9-cert12, certified-20.7-cert2. Two workarounds are available. Disable res_resolver_unbound by setting `noload = res_resolver_unbound.so` in modules.conf, or set `rewrite_contact = yes` on all PJSIP endpoints. NOTE: This may not be appropriate for all Asterisk configurations.
Impacted products
Vendor Product Version
asterisk asterisk Version: < 18.24.3
Version: >= 19.0.0, < 20.9.3
Version: >= 21.0.0, < 21.4.3
Version: < 18.9-cert12
Version: >= 19.0, < 20.7-cert2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-42491",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-05T18:48:24.364960Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-05T18:52:42.844Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "asterisk",
          "vendor": "asterisk",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 18.24.3"
            },
            {
              "status": "affected",
              "version": "\u003e= 19.0.0, \u003c 20.9.3"
            },
            {
              "status": "affected",
              "version": "\u003e= 21.0.0, \u003c 21.4.3"
            },
            {
              "status": "affected",
              "version": "\u003c 18.9-cert12"
            },
            {
              "status": "affected",
              "version": "\u003e= 19.0, \u003c 20.7-cert2"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.24.3, 20.9.3, and 21.4.3 of Asterisk and versions 18.9-cert12 and 20.7-cert2 of certified-asterisk, if Asterisk attempts to send a SIP request to a URI whose host portion starts with `.1` or `[.1]`, and res_resolver_unbound is loaded, Asterisk will crash with a SEGV. To receive a patch, users should upgrade to one of the following versions: 18.24.3, 20.9.3, 21.4.3, certified-18.9-cert12, certified-20.7-cert2. Two workarounds are available. Disable res_resolver_unbound by setting `noload = res_resolver_unbound.so` in modules.conf, or set `rewrite_contact = yes` on all PJSIP endpoints. NOTE: This may not be appropriate for all Asterisk configurations."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-252",
              "description": "CWE-252: Unchecked Return Value",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-476",
              "description": "CWE-476: NULL Pointer Dereference",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-09-05T17:17:56.961Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-v428-g3cw-7hv9",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-v428-g3cw-7hv9"
        },
        {
          "name": "https://github.com/asterisk/asterisk/commit/42a2f4ccfa2c7062a15063e765916b3332e34cc4",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/asterisk/asterisk/commit/42a2f4ccfa2c7062a15063e765916b3332e34cc4"
        },
        {
          "name": "https://github.com/asterisk/asterisk/commit/4f01669c7c41c9184f3cce9a3cf1b2ebf6201742",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/asterisk/asterisk/commit/4f01669c7c41c9184f3cce9a3cf1b2ebf6201742"
        },
        {
          "name": "https://github.com/asterisk/asterisk/commit/50bf8d4d3064930d28ecf1ce3397b14574d514d2",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/asterisk/asterisk/commit/50bf8d4d3064930d28ecf1ce3397b14574d514d2"
        },
        {
          "name": "https://github.com/asterisk/asterisk/commit/7a0090325bfa9d778a39ae5f7d0a98109e4651c8",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/asterisk/asterisk/commit/7a0090325bfa9d778a39ae5f7d0a98109e4651c8"
        },
        {
          "name": "https://github.com/asterisk/asterisk/commit/a15050650abf09c10a3c135fab148220cd41d3a0",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/asterisk/asterisk/commit/a15050650abf09c10a3c135fab148220cd41d3a0"
        }
      ],
      "source": {
        "advisory": "GHSA-v428-g3cw-7hv9",
        "discovery": "UNKNOWN"
      },
      "title": "A malformed Contact or Record-Route URI in an incoming SIP request can cause Asterisk to crash when res_resolver_unbound is used"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2024-42491",
    "datePublished": "2024-09-05T17:17:56.961Z",
    "dateReserved": "2024-08-02T14:13:04.619Z",
    "dateUpdated": "2024-09-05T18:52:42.844Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-2346 (GCVE-0-2009-2346)
Vulnerability from cvelistv5
Published
2009-09-08 18:00
Modified
2024-08-07 05:44
Severity ?
CWE
  • n/a
Summary
The IAX2 protocol implementation in Asterisk Open Source 1.2.x before 1.2.35, 1.4.x before 1.4.26.2, 1.6.0.x before 1.6.0.15, and 1.6.1.x before 1.6.1.6; Business Edition B.x.x before B.2.5.10, C.2.x before C.2.4.3, and C.3.x before C.3.1.1; and s800i 1.3.x before 1.3.0.3 allows remote attackers to cause a denial of service (call-number exhaustion) by initiating many IAX2 message exchanges, a related issue to CVE-2008-3263.
References
http://securitytracker.com/id?1022819 vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/archive/1/506257/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/36593 third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/36275 vdb-entry, x_refsource_BID
http://downloads.asterisk.org/pub/security/AST-2009-006.html x_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:44:55.999Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1022819",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1022819"
          },
          {
            "name": "20090903 AST-2009-006: IAX2 Call Number Resource Exhaustion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/506257/100/0/threaded"
          },
          {
            "name": "36593",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36593"
          },
          {
            "name": "36275",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/36275"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://downloads.asterisk.org/pub/security/AST-2009-006.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-09-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The IAX2 protocol implementation in Asterisk Open Source 1.2.x before 1.2.35, 1.4.x before 1.4.26.2, 1.6.0.x before 1.6.0.15, and 1.6.1.x before 1.6.1.6; Business Edition B.x.x before B.2.5.10, C.2.x before C.2.4.3, and C.3.x before C.3.1.1; and s800i 1.3.x before 1.3.0.3 allows remote attackers to cause a denial of service (call-number exhaustion) by initiating many IAX2 message exchanges, a related issue to CVE-2008-3263."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1022819",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1022819"
        },
        {
          "name": "20090903 AST-2009-006: IAX2 Call Number Resource Exhaustion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/506257/100/0/threaded"
        },
        {
          "name": "36593",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36593"
        },
        {
          "name": "36275",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/36275"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://downloads.asterisk.org/pub/security/AST-2009-006.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2346",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The IAX2 protocol implementation in Asterisk Open Source 1.2.x before 1.2.35, 1.4.x before 1.4.26.2, 1.6.0.x before 1.6.0.15, and 1.6.1.x before 1.6.1.6; Business Edition B.x.x before B.2.5.10, C.2.x before C.2.4.3, and C.3.x before C.3.1.1; and s800i 1.3.x before 1.3.0.3 allows remote attackers to cause a denial of service (call-number exhaustion) by initiating many IAX2 message exchanges, a related issue to CVE-2008-3263."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1022819",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1022819"
            },
            {
              "name": "20090903 AST-2009-006: IAX2 Call Number Resource Exhaustion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/506257/100/0/threaded"
            },
            {
              "name": "36593",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/36593"
            },
            {
              "name": "36275",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/36275"
            },
            {
              "name": "http://downloads.asterisk.org/pub/security/AST-2009-006.html",
              "refsource": "CONFIRM",
              "url": "http://downloads.asterisk.org/pub/security/AST-2009-006.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2346",
    "datePublished": "2009-09-08T18:00:00",
    "dateReserved": "2009-07-07T00:00:00",
    "dateUpdated": "2024-08-07T05:44:55.999Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-1561 (GCVE-0-2007-1561)
Vulnerability from cvelistv5
Published
2007-03-21 19:00
Modified
2024-08-07 12:59
Severity ?
CWE
  • n/a
Summary
The channel driver in Asterisk before 1.2.17 and 1.4.x before 1.4.2 allows remote attackers to cause a denial of service (crash) via a SIP INVITE message with an SDP containing one valid and one invalid IP address.
References
http://www.securitytracker.com/id?1017794 vdb-entry, x_refsource_SECTRACK
http://marc.info/?l=full-disclosure&m=117432783011737&w=2 mailing-list, x_refsource_FULLDISC
http://secunia.com/advisories/24564 third-party-advisory, x_refsource_SECUNIA
http://asterisk.org/node/48339 x_refsource_CONFIRM
http://www.novell.com/linux/security/advisories/2007_34_asterisk.html vendor-advisory, x_refsource_SUSE
http://www.securityfocus.com/archive/1/463434/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/bid/23031 vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/33068 vdb-entry, x_refsource_XF
http://security.gentoo.org/glsa/glsa-200704-01.xml vendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/25582 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/24719 third-party-advisory, x_refsource_SECUNIA
http://www.sineapps.com/news.php?rssid=1707 x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2007/1039 vdb-entry, x_refsource_VUPEN
http://www.debian.org/security/2007/dsa-1358 vendor-advisory, x_refsource_DEBIAN
http://www.osvdb.org/34479 vdb-entry, x_refsource_OSVDB
http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html mailing-list, x_refsource_MLIST
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:59:08.721Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1017794",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1017794"
          },
          {
            "name": "20070319 Asterisk SDP DOS vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=full-disclosure\u0026m=117432783011737\u0026w=2"
          },
          {
            "name": "24564",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24564"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://asterisk.org/node/48339"
          },
          {
            "name": "SUSE-SA:2007:034",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
          },
          {
            "name": "20070321 Two new DoS Vulnerabilities in Asterisk Fixed",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/463434/100/0/threaded"
          },
          {
            "name": "23031",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/23031"
          },
          {
            "name": "asterisk-sip-invite-dos(33068)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33068"
          },
          {
            "name": "GLSA-200704-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200704-01.xml"
          },
          {
            "name": "25582",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25582"
          },
          {
            "name": "24719",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24719"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sineapps.com/news.php?rssid=1707"
          },
          {
            "name": "ADV-2007-1039",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/1039"
          },
          {
            "name": "DSA-1358",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2007/dsa-1358"
          },
          {
            "name": "34479",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/34479"
          },
          {
            "name": "[VOIPSEC] 20070319 Asterisk SDP DOS vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-03-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The channel driver in Asterisk before 1.2.17 and 1.4.x before 1.4.2 allows remote attackers to cause a denial of service (crash) via a SIP INVITE message with an SDP containing one valid and one invalid IP address."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1017794",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1017794"
        },
        {
          "name": "20070319 Asterisk SDP DOS vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://marc.info/?l=full-disclosure\u0026m=117432783011737\u0026w=2"
        },
        {
          "name": "24564",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24564"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://asterisk.org/node/48339"
        },
        {
          "name": "SUSE-SA:2007:034",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
        },
        {
          "name": "20070321 Two new DoS Vulnerabilities in Asterisk Fixed",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/463434/100/0/threaded"
        },
        {
          "name": "23031",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/23031"
        },
        {
          "name": "asterisk-sip-invite-dos(33068)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33068"
        },
        {
          "name": "GLSA-200704-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200704-01.xml"
        },
        {
          "name": "25582",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25582"
        },
        {
          "name": "24719",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24719"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sineapps.com/news.php?rssid=1707"
        },
        {
          "name": "ADV-2007-1039",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/1039"
        },
        {
          "name": "DSA-1358",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2007/dsa-1358"
        },
        {
          "name": "34479",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/34479"
        },
        {
          "name": "[VOIPSEC] 20070319 Asterisk SDP DOS vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-1561",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The channel driver in Asterisk before 1.2.17 and 1.4.x before 1.4.2 allows remote attackers to cause a denial of service (crash) via a SIP INVITE message with an SDP containing one valid and one invalid IP address."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1017794",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1017794"
            },
            {
              "name": "20070319 Asterisk SDP DOS vulnerability",
              "refsource": "FULLDISC",
              "url": "http://marc.info/?l=full-disclosure\u0026m=117432783011737\u0026w=2"
            },
            {
              "name": "24564",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24564"
            },
            {
              "name": "http://asterisk.org/node/48339",
              "refsource": "CONFIRM",
              "url": "http://asterisk.org/node/48339"
            },
            {
              "name": "SUSE-SA:2007:034",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
            },
            {
              "name": "20070321 Two new DoS Vulnerabilities in Asterisk Fixed",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/463434/100/0/threaded"
            },
            {
              "name": "23031",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/23031"
            },
            {
              "name": "asterisk-sip-invite-dos(33068)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33068"
            },
            {
              "name": "GLSA-200704-01",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200704-01.xml"
            },
            {
              "name": "25582",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25582"
            },
            {
              "name": "24719",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24719"
            },
            {
              "name": "http://www.sineapps.com/news.php?rssid=1707",
              "refsource": "CONFIRM",
              "url": "http://www.sineapps.com/news.php?rssid=1707"
            },
            {
              "name": "ADV-2007-1039",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/1039"
            },
            {
              "name": "DSA-1358",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2007/dsa-1358"
            },
            {
              "name": "34479",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/34479"
            },
            {
              "name": "[VOIPSEC] 20070319 Asterisk SDP DOS vulnerability",
              "refsource": "MLIST",
              "url": "http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-1561",
    "datePublished": "2007-03-21T19:00:00",
    "dateReserved": "2007-03-21T00:00:00",
    "dateUpdated": "2024-08-07T12:59:08.721Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-3765 (GCVE-0-2007-3765)
Vulnerability from cvelistv5
Published
2007-07-18 17:00
Modified
2024-08-07 14:28
Severity ?
CWE
  • n/a
Summary
The STUN implementation in Asterisk 1.4.x before 1.4.8, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted STUN length attribute in a STUN packet sent on an RTP port.
References
http://secunia.com/advisories/26099 third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/24950 vdb-entry, x_refsource_BID
http://www.securitytracker.com/id?1018407 vdb-entry, x_refsource_SECTRACK
http://ftp.digium.com/pub/asa/ASA-2007-017.pdf x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/35480 vdb-entry, x_refsource_XF
http://www.vupen.com/english/advisories/2007/2563 vdb-entry, x_refsource_VUPEN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:28:52.295Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "26099",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26099"
          },
          {
            "name": "24950",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/24950"
          },
          {
            "name": "1018407",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1018407"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ftp.digium.com/pub/asa/ASA-2007-017.pdf"
          },
          {
            "name": "asterisk-stun-dos(35480)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35480"
          },
          {
            "name": "ADV-2007-2563",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/2563"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-07-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The STUN implementation in Asterisk 1.4.x before 1.4.8, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted STUN length attribute in a STUN packet sent on an RTP port."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "26099",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26099"
        },
        {
          "name": "24950",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/24950"
        },
        {
          "name": "1018407",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1018407"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ftp.digium.com/pub/asa/ASA-2007-017.pdf"
        },
        {
          "name": "asterisk-stun-dos(35480)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35480"
        },
        {
          "name": "ADV-2007-2563",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/2563"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-3765",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The STUN implementation in Asterisk 1.4.x before 1.4.8, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted STUN length attribute in a STUN packet sent on an RTP port."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "26099",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26099"
            },
            {
              "name": "24950",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/24950"
            },
            {
              "name": "1018407",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1018407"
            },
            {
              "name": "http://ftp.digium.com/pub/asa/ASA-2007-017.pdf",
              "refsource": "CONFIRM",
              "url": "http://ftp.digium.com/pub/asa/ASA-2007-017.pdf"
            },
            {
              "name": "asterisk-stun-dos(35480)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35480"
            },
            {
              "name": "ADV-2007-2563",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/2563"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-3765",
    "datePublished": "2007-07-18T17:00:00",
    "dateReserved": "2007-07-13T00:00:00",
    "dateUpdated": "2024-08-07T14:28:52.295Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-4280 (GCVE-0-2007-4280)
Vulnerability from cvelistv5
Published
2007-08-09 21:00
Modified
2024-08-07 14:46
Severity ?
CWE
  • n/a
Summary
The Skinny channel driver (chan_skinny) in Asterisk Open Source before 1.4.10, AsteriskNOW before beta7, Appliance Developer Kit before 0.7.0, and Appliance s800i before 1.0.3 allows remote authenticated users to cause a denial of service (application crash) via a CAPABILITIES_RES_MESSAGE packet with a capabilities count larger than the capabilities_res_message array population.
References
http://www.vupen.com/english/advisories/2007/2808 vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/26340 third-party-advisory, x_refsource_SECUNIA
http://downloads.digium.com/pub/asa/ASA-2007-019.pdf x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/35870 vdb-entry, x_refsource_XF
http://www.securityfocus.com/bid/25228 vdb-entry, x_refsource_BID
http://www.securitytracker.com/id?1018536 vdb-entry, x_refsource_SECTRACK
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:46:39.690Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2007-2808",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/2808"
          },
          {
            "name": "26340",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26340"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://downloads.digium.com/pub/asa/ASA-2007-019.pdf"
          },
          {
            "name": "asterisk-skinny-channel-dos(35870)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35870"
          },
          {
            "name": "25228",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/25228"
          },
          {
            "name": "1018536",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1018536"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-08-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Skinny channel driver (chan_skinny) in Asterisk Open Source before 1.4.10, AsteriskNOW before beta7, Appliance Developer Kit before 0.7.0, and Appliance s800i before 1.0.3 allows remote authenticated users to cause a denial of service (application crash) via a CAPABILITIES_RES_MESSAGE packet with a capabilities count larger than the capabilities_res_message array population."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2007-2808",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/2808"
        },
        {
          "name": "26340",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26340"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://downloads.digium.com/pub/asa/ASA-2007-019.pdf"
        },
        {
          "name": "asterisk-skinny-channel-dos(35870)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35870"
        },
        {
          "name": "25228",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/25228"
        },
        {
          "name": "1018536",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1018536"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-4280",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Skinny channel driver (chan_skinny) in Asterisk Open Source before 1.4.10, AsteriskNOW before beta7, Appliance Developer Kit before 0.7.0, and Appliance s800i before 1.0.3 allows remote authenticated users to cause a denial of service (application crash) via a CAPABILITIES_RES_MESSAGE packet with a capabilities count larger than the capabilities_res_message array population."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2007-2808",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/2808"
            },
            {
              "name": "26340",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26340"
            },
            {
              "name": "http://downloads.digium.com/pub/asa/ASA-2007-019.pdf",
              "refsource": "CONFIRM",
              "url": "http://downloads.digium.com/pub/asa/ASA-2007-019.pdf"
            },
            {
              "name": "asterisk-skinny-channel-dos(35870)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35870"
            },
            {
              "name": "25228",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/25228"
            },
            {
              "name": "1018536",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1018536"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-4280",
    "datePublished": "2007-08-09T21:00:00",
    "dateReserved": "2007-08-09T00:00:00",
    "dateUpdated": "2024-08-07T14:46:39.690Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-42365 (GCVE-0-2024-42365)
Vulnerability from cvelistv5
Published
2024-08-08 16:29
Modified
2024-08-12 15:49
CWE
  • CWE-267 - Privilege Defined With Unsafe Actions
  • CWE-1220 - Insufficient Granularity of Access Control
Summary
Asterisk is an open source private branch exchange (PBX) and telephony toolkit. Prior to asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2, an AMI user with `write=originate` may change all configuration files in the `/etc/asterisk/` directory. This occurs because they are able to curl remote files and write them to disk, but are also able to append to existing files using the `FILE` function inside the `SET` application. This issue may result in privilege escalation, remote code execution and/or blind server-side request forgery with arbitrary protocol. Asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2 contain a fix for this issue.
Impacted products
Vendor Product Version
asterisk asterisk Version: < 18.24.2
Version: >= 19.0.0, < 20.9.2
Version: >= 21.0.0, < 21.4.2
Version: < 18.9-cert11
Version: >= 19.0, < 20.7-cert2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:asterisk:certified_asterisk:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "certified_asterisk",
            "vendor": "asterisk",
            "versions": [
              {
                "lessThan": "18.9-cert11",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "20.7-cert2",
                "status": "affected",
                "version": "19.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:asterisk:asterisk:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "asterisk",
            "vendor": "asterisk",
            "versions": [
              {
                "lessThan": "18.24.2",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "20.9.2",
                "status": "affected",
                "version": "19.0.0",
                "versionType": "custom"
              },
              {
                "lessThan": "21.4.2",
                "status": "affected",
                "version": "21.0.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-42365",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-08T16:38:45.608389Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-12T15:49:00.190Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "asterisk",
          "vendor": "asterisk",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 18.24.2"
            },
            {
              "status": "affected",
              "version": "\u003e= 19.0.0, \u003c 20.9.2"
            },
            {
              "status": "affected",
              "version": "\u003e= 21.0.0, \u003c 21.4.2"
            },
            {
              "status": "affected",
              "version": "\u003c 18.9-cert11"
            },
            {
              "status": "affected",
              "version": "\u003e= 19.0, \u003c 20.7-cert2"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Asterisk is an open source private branch exchange (PBX) and telephony toolkit. Prior to asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2, an AMI user with `write=originate` may change all configuration files in the `/etc/asterisk/` directory. This occurs because they are able to curl remote files and write them to disk, but are also able to append to existing files using the `FILE` function inside the `SET` application. This issue may result in privilege escalation, remote code execution and/or blind server-side request forgery with arbitrary protocol. Asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2 contain a fix for this issue."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-267",
              "description": "CWE-267: Privilege Defined With Unsafe Actions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-1220",
              "description": "CWE-1220: Insufficient Granularity of Access Control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-08T16:29:07.436Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-c4cg-9275-6w44",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-c4cg-9275-6w44"
        },
        {
          "name": "https://github.com/asterisk/asterisk/commit/42a2f4ccfa2c7062a15063e765916b3332e34cc4",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/asterisk/asterisk/commit/42a2f4ccfa2c7062a15063e765916b3332e34cc4"
        },
        {
          "name": "https://github.com/asterisk/asterisk/commit/7a0090325bfa9d778a39ae5f7d0a98109e4651c8",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/asterisk/asterisk/commit/7a0090325bfa9d778a39ae5f7d0a98109e4651c8"
        },
        {
          "name": "https://github.com/asterisk/asterisk/commit/b4063bf756272254b160b6d1bd6e9a3f8e16cc71",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/asterisk/asterisk/commit/b4063bf756272254b160b6d1bd6e9a3f8e16cc71"
        },
        {
          "name": "https://github.com/asterisk/asterisk/commit/bbe68db10ab8a80c29db383e4dfe14f6eafaf993",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/asterisk/asterisk/commit/bbe68db10ab8a80c29db383e4dfe14f6eafaf993"
        },
        {
          "name": "https://github.com/asterisk/asterisk/commit/faddd99f2b9408b524e5eb8a01589fe1fa282df2",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/asterisk/asterisk/commit/faddd99f2b9408b524e5eb8a01589fe1fa282df2"
        },
        {
          "name": "https://github.com/asterisk/asterisk/blob/14367caaf7241df1eceea7c45c5b261989c2c6db/main/manager.c#L6426",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/asterisk/asterisk/blob/14367caaf7241df1eceea7c45c5b261989c2c6db/main/manager.c#L6426"
        },
        {
          "name": "https://github.com/asterisk/asterisk/blob/7d28165cb1b2d02d66e8693bd3fe23ee72fc55d8/main/manager.c#L6426",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/asterisk/asterisk/blob/7d28165cb1b2d02d66e8693bd3fe23ee72fc55d8/main/manager.c#L6426"
        }
      ],
      "source": {
        "advisory": "GHSA-c4cg-9275-6w44",
        "discovery": "UNKNOWN"
      },
      "title": "Asterisk allows `Write=originate` as sufficient permissions for code execution / `System()` dialplan"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2024-42365",
    "datePublished": "2024-08-08T16:29:07.436Z",
    "dateReserved": "2024-07-30T14:01:33.923Z",
    "dateUpdated": "2024-08-12T15:49:00.190Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1390 (GCVE-0-2008-1390)
Vulnerability from cvelistv5
Published
2008-03-24 17:00
Modified
2024-08-07 08:17
Severity ?
CWE
  • n/a
Summary
The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:17:34.588Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "3764",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3764"
          },
          {
            "name": "28316",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28316"
          },
          {
            "name": "20080318 AST-2008-005: HTTP Manager ID is predictable",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/489819/100/0/threaded"
          },
          {
            "name": "asterisk-httpmanagerid-weak-security(41304)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41304"
          },
          {
            "name": "29449",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29449"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://downloads.digium.com/pub/security/AST-2008-005.html"
          },
          {
            "name": "FEDORA-2008-2554",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
          },
          {
            "name": "1019679",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019679"
          },
          {
            "name": "FEDORA-2008-2620",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
          },
          {
            "name": "29470",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29470"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "3764",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3764"
        },
        {
          "name": "28316",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28316"
        },
        {
          "name": "20080318 AST-2008-005: HTTP Manager ID is predictable",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/489819/100/0/threaded"
        },
        {
          "name": "asterisk-httpmanagerid-weak-security(41304)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41304"
        },
        {
          "name": "29449",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29449"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://downloads.digium.com/pub/security/AST-2008-005.html"
        },
        {
          "name": "FEDORA-2008-2554",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
        },
        {
          "name": "1019679",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019679"
        },
        {
          "name": "FEDORA-2008-2620",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
        },
        {
          "name": "29470",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29470"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1390",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "3764",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3764"
            },
            {
              "name": "28316",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28316"
            },
            {
              "name": "20080318 AST-2008-005: HTTP Manager ID is predictable",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/489819/100/0/threaded"
            },
            {
              "name": "asterisk-httpmanagerid-weak-security(41304)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41304"
            },
            {
              "name": "29449",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29449"
            },
            {
              "name": "http://downloads.digium.com/pub/security/AST-2008-005.html",
              "refsource": "CONFIRM",
              "url": "http://downloads.digium.com/pub/security/AST-2008-005.html"
            },
            {
              "name": "FEDORA-2008-2554",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
            },
            {
              "name": "1019679",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019679"
            },
            {
              "name": "FEDORA-2008-2620",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
            },
            {
              "name": "29470",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29470"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1390",
    "datePublished": "2008-03-24T17:00:00",
    "dateReserved": "2008-03-18T00:00:00",
    "dateUpdated": "2024-08-07T08:17:34.588Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-2488 (GCVE-0-2007-2488)
Vulnerability from cvelistv5
Published
2007-05-07 19:00
Modified
2024-08-07 13:42
Severity ?
CWE
  • n/a
Summary
The IAX2 channel driver (chan_iax2) in Asterisk before 20070504 does not properly null terminate data, which allows remote attackers to trigger loss of transmitted data, and possibly obtain sensitive information (memory contents) or cause a denial of service (application crash), by sending a frame that lacks a 0 byte.
References
http://www.vupen.com/english/advisories/2007/1661 vdb-entry, x_refsource_VUPEN
http://www.novell.com/linux/security/advisories/2007_34_asterisk.html vendor-advisory, x_refsource_SUSE
http://osvdb.org/35769 vdb-entry, x_refsource_OSVDB
https://exchange.xforce.ibmcloud.com/vulnerabilities/34085 vdb-entry, x_refsource_XF
http://secunia.com/advisories/25582 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/25134 third-party-advisory, x_refsource_SECUNIA
http://ftp.digium.com/pub/asa/ASA-2007-013.pdf x_refsource_CONFIRM
http://www.securityfocus.com/bid/23824 vdb-entry, x_refsource_BID
http://www.debian.org/security/2007/dsa-1358 vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T13:42:33.558Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2007-1661",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/1661"
          },
          {
            "name": "SUSE-SA:2007:034",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
          },
          {
            "name": "35769",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/35769"
          },
          {
            "name": "asterisk-iax2-information-disclosure(34085)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34085"
          },
          {
            "name": "25582",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25582"
          },
          {
            "name": "25134",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25134"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ftp.digium.com/pub/asa/ASA-2007-013.pdf"
          },
          {
            "name": "23824",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/23824"
          },
          {
            "name": "DSA-1358",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2007/dsa-1358"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-05-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The IAX2 channel driver (chan_iax2) in Asterisk before 20070504 does not properly null terminate data, which allows remote attackers to trigger loss of transmitted data, and possibly obtain sensitive information (memory contents) or cause a denial of service (application crash), by sending a frame that lacks a 0 byte."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2007-1661",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/1661"
        },
        {
          "name": "SUSE-SA:2007:034",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
        },
        {
          "name": "35769",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/35769"
        },
        {
          "name": "asterisk-iax2-information-disclosure(34085)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34085"
        },
        {
          "name": "25582",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25582"
        },
        {
          "name": "25134",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25134"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ftp.digium.com/pub/asa/ASA-2007-013.pdf"
        },
        {
          "name": "23824",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/23824"
        },
        {
          "name": "DSA-1358",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2007/dsa-1358"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-2488",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The IAX2 channel driver (chan_iax2) in Asterisk before 20070504 does not properly null terminate data, which allows remote attackers to trigger loss of transmitted data, and possibly obtain sensitive information (memory contents) or cause a denial of service (application crash), by sending a frame that lacks a 0 byte."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2007-1661",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/1661"
            },
            {
              "name": "SUSE-SA:2007:034",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
            },
            {
              "name": "35769",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/35769"
            },
            {
              "name": "asterisk-iax2-information-disclosure(34085)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34085"
            },
            {
              "name": "25582",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25582"
            },
            {
              "name": "25134",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25134"
            },
            {
              "name": "http://ftp.digium.com/pub/asa/ASA-2007-013.pdf",
              "refsource": "CONFIRM",
              "url": "http://ftp.digium.com/pub/asa/ASA-2007-013.pdf"
            },
            {
              "name": "23824",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/23824"
            },
            {
              "name": "DSA-1358",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2007/dsa-1358"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-2488",
    "datePublished": "2007-05-07T19:00:00",
    "dateReserved": "2007-05-03T00:00:00",
    "dateUpdated": "2024-08-07T13:42:33.558Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-3263 (GCVE-0-2008-3263)
Vulnerability from cvelistv5
Published
2008-07-22 23:00
Modified
2024-08-07 09:28
Severity ?
CWE
  • n/a
Summary
The IAX2 protocol implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (call-number exhaustion and CPU consumption) by quickly sending a large number of IAX2 (IAX) POKE requests.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T09:28:41.740Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-200905-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200905-01.xml"
          },
          {
            "name": "30321",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/30321"
          },
          {
            "name": "31194",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31194"
          },
          {
            "name": "asterisk-poke-dos(43942)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43942"
          },
          {
            "name": "ADV-2008-2168",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2168/references"
          },
          {
            "name": "FEDORA-2008-6676",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html"
          },
          {
            "name": "31178",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31178"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://downloads.securityfocus.com/vulnerabilities/exploits/30321.pl"
          },
          {
            "name": "20080722 AST-2008-010: Asterisk IAX \u0027POKE\u0027 resource exhaustion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/494675/100/0/threaded"
          },
          {
            "name": "1020535",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1020535"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://downloads.digium.com/pub/security/AST-2008-010.html"
          },
          {
            "name": "34982",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34982"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-07-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The IAX2 protocol implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (call-number exhaustion and CPU consumption) by quickly sending a large number of IAX2 (IAX) POKE requests."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "GLSA-200905-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200905-01.xml"
        },
        {
          "name": "30321",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/30321"
        },
        {
          "name": "31194",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31194"
        },
        {
          "name": "asterisk-poke-dos(43942)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43942"
        },
        {
          "name": "ADV-2008-2168",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2168/references"
        },
        {
          "name": "FEDORA-2008-6676",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html"
        },
        {
          "name": "31178",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31178"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://downloads.securityfocus.com/vulnerabilities/exploits/30321.pl"
        },
        {
          "name": "20080722 AST-2008-010: Asterisk IAX \u0027POKE\u0027 resource exhaustion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/494675/100/0/threaded"
        },
        {
          "name": "1020535",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1020535"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://downloads.digium.com/pub/security/AST-2008-010.html"
        },
        {
          "name": "34982",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34982"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-3263",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The IAX2 protocol implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (call-number exhaustion and CPU consumption) by quickly sending a large number of IAX2 (IAX) POKE requests."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "GLSA-200905-01",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200905-01.xml"
            },
            {
              "name": "30321",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/30321"
            },
            {
              "name": "31194",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31194"
            },
            {
              "name": "asterisk-poke-dos(43942)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43942"
            },
            {
              "name": "ADV-2008-2168",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/2168/references"
            },
            {
              "name": "FEDORA-2008-6676",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html"
            },
            {
              "name": "31178",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31178"
            },
            {
              "name": "http://downloads.securityfocus.com/vulnerabilities/exploits/30321.pl",
              "refsource": "MISC",
              "url": "http://downloads.securityfocus.com/vulnerabilities/exploits/30321.pl"
            },
            {
              "name": "20080722 AST-2008-010: Asterisk IAX \u0027POKE\u0027 resource exhaustion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/494675/100/0/threaded"
            },
            {
              "name": "1020535",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1020535"
            },
            {
              "name": "http://downloads.digium.com/pub/security/AST-2008-010.html",
              "refsource": "CONFIRM",
              "url": "http://downloads.digium.com/pub/security/AST-2008-010.html"
            },
            {
              "name": "34982",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34982"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-3263",
    "datePublished": "2008-07-22T23:00:00",
    "dateReserved": "2008-07-22T00:00:00",
    "dateUpdated": "2024-08-07T09:28:41.740Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-3762 (GCVE-0-2007-3762)
Vulnerability from cvelistv5
Published
2007-07-18 17:00
Modified
2024-08-07 14:28
Severity ?
CWE
  • n/a
Summary
Stack-based buffer overflow in the IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to execute arbitrary code by sending a long (1) voice or (2) video RTP frame.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/35466 vdb-entry, x_refsource_XF
http://secunia.com/advisories/26099 third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id?1018407 vdb-entry, x_refsource_SECTRACK
http://security.gentoo.org/glsa/glsa-200802-11.xml vendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/29051 third-party-advisory, x_refsource_SECUNIA
http://bugs.gentoo.org/show_bug.cgi?id=185713 x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2007/2563 vdb-entry, x_refsource_VUPEN
http://www.debian.org/security/2007/dsa-1358 vendor-advisory, x_refsource_DEBIAN
http://www.novell.com/linux/security/advisories/2007_15_sr.html vendor-advisory, x_refsource_SUSE
http://ftp.digium.com/pub/asa/ASA-2007-014.pdf x_refsource_CONFIRM
http://www.securityfocus.com/bid/24949 vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:28:52.292Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "asterisk-iax2channeldriver-bo(35466)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35466"
          },
          {
            "name": "26099",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26099"
          },
          {
            "name": "1018407",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1018407"
          },
          {
            "name": "GLSA-200802-11",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml"
          },
          {
            "name": "29051",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29051"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713"
          },
          {
            "name": "ADV-2007-2563",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/2563"
          },
          {
            "name": "DSA-1358",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2007/dsa-1358"
          },
          {
            "name": "SUSE-SR:2007:015",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ftp.digium.com/pub/asa/ASA-2007-014.pdf"
          },
          {
            "name": "24949",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/24949"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-07-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to execute arbitrary code by sending a long (1) voice or (2) video RTP frame."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "asterisk-iax2channeldriver-bo(35466)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35466"
        },
        {
          "name": "26099",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26099"
        },
        {
          "name": "1018407",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1018407"
        },
        {
          "name": "GLSA-200802-11",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml"
        },
        {
          "name": "29051",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29051"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713"
        },
        {
          "name": "ADV-2007-2563",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/2563"
        },
        {
          "name": "DSA-1358",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2007/dsa-1358"
        },
        {
          "name": "SUSE-SR:2007:015",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ftp.digium.com/pub/asa/ASA-2007-014.pdf"
        },
        {
          "name": "24949",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/24949"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-3762",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to execute arbitrary code by sending a long (1) voice or (2) video RTP frame."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "asterisk-iax2channeldriver-bo(35466)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35466"
            },
            {
              "name": "26099",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26099"
            },
            {
              "name": "1018407",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1018407"
            },
            {
              "name": "GLSA-200802-11",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml"
            },
            {
              "name": "29051",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29051"
            },
            {
              "name": "http://bugs.gentoo.org/show_bug.cgi?id=185713",
              "refsource": "CONFIRM",
              "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713"
            },
            {
              "name": "ADV-2007-2563",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/2563"
            },
            {
              "name": "DSA-1358",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2007/dsa-1358"
            },
            {
              "name": "SUSE-SR:2007:015",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
            },
            {
              "name": "http://ftp.digium.com/pub/asa/ASA-2007-014.pdf",
              "refsource": "CONFIRM",
              "url": "http://ftp.digium.com/pub/asa/ASA-2007-014.pdf"
            },
            {
              "name": "24949",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/24949"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-3762",
    "datePublished": "2007-07-18T17:00:00",
    "dateReserved": "2007-07-13T00:00:00",
    "dateUpdated": "2024-08-07T14:28:52.292Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1332 (GCVE-0-2008-1332)
Vulnerability from cvelistv5
Published
2008-03-20 00:00
Modified
2024-08-07 08:17
Severity ?
CWE
  • n/a
Summary
Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header.
References
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html vendor-advisory, x_refsource_SUSE
http://secunia.com/advisories/29782 third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-200804-13.xml vendor-advisory, x_refsource_GENTOO
http://downloads.digium.com/pub/security/AST-2008-003.html x_refsource_CONFIRM
http://www.securityfocus.com/bid/28310 vdb-entry, x_refsource_BID
http://www.securityfocus.com/archive/1/489818/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://www.debian.org/security/2008/dsa-1525 vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/29426 third-party-advisory, x_refsource_SECUNIA
http://www.asterisk.org/node/48466 x_refsource_CONFIRM
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html vendor-advisory, x_refsource_FEDORA
http://securitytracker.com/id?1019629 vdb-entry, x_refsource_SECTRACK
https://exchange.xforce.ibmcloud.com/vulnerabilities/41308 vdb-entry, x_refsource_XF
http://www.vupen.com/english/advisories/2008/0928 vdb-entry, x_refsource_VUPEN
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html vendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/29957 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/29456 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/29470 third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:17:34.472Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SUSE-SR:2008:010",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html"
          },
          {
            "name": "29782",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29782"
          },
          {
            "name": "GLSA-200804-13",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200804-13.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://downloads.digium.com/pub/security/AST-2008-003.html"
          },
          {
            "name": "28310",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28310"
          },
          {
            "name": "20080318 AST-2008-003: Unauthenticated calls allowed from SIP channel driver",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/489818/100/0/threaded"
          },
          {
            "name": "DSA-1525",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1525"
          },
          {
            "name": "29426",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29426"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.asterisk.org/node/48466"
          },
          {
            "name": "FEDORA-2008-2554",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
          },
          {
            "name": "1019629",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1019629"
          },
          {
            "name": "asterisk-sip-security-bypass(41308)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41308"
          },
          {
            "name": "ADV-2008-0928",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0928"
          },
          {
            "name": "FEDORA-2008-2620",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
          },
          {
            "name": "29957",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29957"
          },
          {
            "name": "29456",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29456"
          },
          {
            "name": "29470",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29470"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "SUSE-SR:2008:010",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html"
        },
        {
          "name": "29782",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29782"
        },
        {
          "name": "GLSA-200804-13",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200804-13.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://downloads.digium.com/pub/security/AST-2008-003.html"
        },
        {
          "name": "28310",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28310"
        },
        {
          "name": "20080318 AST-2008-003: Unauthenticated calls allowed from SIP channel driver",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/489818/100/0/threaded"
        },
        {
          "name": "DSA-1525",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1525"
        },
        {
          "name": "29426",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29426"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.asterisk.org/node/48466"
        },
        {
          "name": "FEDORA-2008-2554",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
        },
        {
          "name": "1019629",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1019629"
        },
        {
          "name": "asterisk-sip-security-bypass(41308)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41308"
        },
        {
          "name": "ADV-2008-0928",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0928"
        },
        {
          "name": "FEDORA-2008-2620",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
        },
        {
          "name": "29957",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29957"
        },
        {
          "name": "29456",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29456"
        },
        {
          "name": "29470",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29470"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1332",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SUSE-SR:2008:010",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html"
            },
            {
              "name": "29782",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29782"
            },
            {
              "name": "GLSA-200804-13",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200804-13.xml"
            },
            {
              "name": "http://downloads.digium.com/pub/security/AST-2008-003.html",
              "refsource": "CONFIRM",
              "url": "http://downloads.digium.com/pub/security/AST-2008-003.html"
            },
            {
              "name": "28310",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28310"
            },
            {
              "name": "20080318 AST-2008-003: Unauthenticated calls allowed from SIP channel driver",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/489818/100/0/threaded"
            },
            {
              "name": "DSA-1525",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1525"
            },
            {
              "name": "29426",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29426"
            },
            {
              "name": "http://www.asterisk.org/node/48466",
              "refsource": "CONFIRM",
              "url": "http://www.asterisk.org/node/48466"
            },
            {
              "name": "FEDORA-2008-2554",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
            },
            {
              "name": "1019629",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1019629"
            },
            {
              "name": "asterisk-sip-security-bypass(41308)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41308"
            },
            {
              "name": "ADV-2008-0928",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0928"
            },
            {
              "name": "FEDORA-2008-2620",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
            },
            {
              "name": "29957",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29957"
            },
            {
              "name": "29456",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29456"
            },
            {
              "name": "29470",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29470"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1332",
    "datePublished": "2008-03-20T00:00:00",
    "dateReserved": "2008-03-13T00:00:00",
    "dateUpdated": "2024-08-07T08:17:34.472Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-4455 (GCVE-0-2007-4455)
Vulnerability from cvelistv5
Published
2007-08-22 01:00
Modified
2024-08-07 14:53
Severity ?
CWE
  • n/a
Summary
The SIP channel driver (chan_sip) in Asterisk Open Source 1.4.x before 1.4.11, AsteriskNOW before beta7, Asterisk Appliance Developer Kit 0.x before 0.8.0, and s800i (Asterisk Appliance) 1.x before 1.0.3 allows remote attackers to cause a denial of service (memory exhaustion) via a SIP dialog that causes a large number of history entries to be created.
References
http://securityreason.com/securityalert/3047 third-party-advisory, x_refsource_SREASON
http://www.vupen.com/english/advisories/2007/2953 vdb-entry, x_refsource_VUPEN
http://downloads.digium.com/pub/asa/AST-2007-020.html x_refsource_CONFIRM
http://www.securityfocus.com/bid/25392 vdb-entry, x_refsource_BID
http://seclists.org/fulldisclosure/2007/Aug/0393.html mailing-list, x_refsource_FULLDISC
https://exchange.xforce.ibmcloud.com/vulnerabilities/36145 vdb-entry, x_refsource_XF
http://secunia.com/advisories/26553 third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id?1018595 vdb-entry, x_refsource_SECTRACK
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:53:55.958Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "3047",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3047"
          },
          {
            "name": "ADV-2007-2953",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/2953"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://downloads.digium.com/pub/asa/AST-2007-020.html"
          },
          {
            "name": "25392",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/25392"
          },
          {
            "name": "20070821 AST-2007-020: Resource Exhaustion Vulnerability in Asterisk SIP channel driver",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2007/Aug/0393.html"
          },
          {
            "name": "asterisk-sip-dialoghistory-dos(36145)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36145"
          },
          {
            "name": "26553",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26553"
          },
          {
            "name": "1018595",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1018595"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-08-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The SIP channel driver (chan_sip) in Asterisk Open Source 1.4.x before 1.4.11, AsteriskNOW before beta7, Asterisk Appliance Developer Kit 0.x before 0.8.0, and s800i (Asterisk Appliance) 1.x before 1.0.3 allows remote attackers to cause a denial of service (memory exhaustion) via a SIP dialog that causes a large number of history entries to be created."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "3047",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3047"
        },
        {
          "name": "ADV-2007-2953",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/2953"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://downloads.digium.com/pub/asa/AST-2007-020.html"
        },
        {
          "name": "25392",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/25392"
        },
        {
          "name": "20070821 AST-2007-020: Resource Exhaustion Vulnerability in Asterisk SIP channel driver",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2007/Aug/0393.html"
        },
        {
          "name": "asterisk-sip-dialoghistory-dos(36145)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36145"
        },
        {
          "name": "26553",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26553"
        },
        {
          "name": "1018595",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1018595"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-4455",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The SIP channel driver (chan_sip) in Asterisk Open Source 1.4.x before 1.4.11, AsteriskNOW before beta7, Asterisk Appliance Developer Kit 0.x before 0.8.0, and s800i (Asterisk Appliance) 1.x before 1.0.3 allows remote attackers to cause a denial of service (memory exhaustion) via a SIP dialog that causes a large number of history entries to be created."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "3047",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3047"
            },
            {
              "name": "ADV-2007-2953",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/2953"
            },
            {
              "name": "http://downloads.digium.com/pub/asa/AST-2007-020.html",
              "refsource": "CONFIRM",
              "url": "http://downloads.digium.com/pub/asa/AST-2007-020.html"
            },
            {
              "name": "25392",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/25392"
            },
            {
              "name": "20070821 AST-2007-020: Resource Exhaustion Vulnerability in Asterisk SIP channel driver",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2007/Aug/0393.html"
            },
            {
              "name": "asterisk-sip-dialoghistory-dos(36145)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36145"
            },
            {
              "name": "26553",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26553"
            },
            {
              "name": "1018595",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1018595"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-4455",
    "datePublished": "2007-08-22T01:00:00",
    "dateReserved": "2007-08-21T00:00:00",
    "dateUpdated": "2024-08-07T14:53:55.958Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-2297 (GCVE-0-2007-2297)
Vulnerability from cvelistv5
Published
2007-04-26 20:00
Modified
2024-08-07 13:33
Severity ?
CWE
  • n/a
Summary
The SIP channel driver (chan_sip) in Asterisk before 1.2.18 and 1.4.x before 1.4.3 does not properly parse SIP UDP packets that do not contain a valid response code, which allows remote attackers to cause a denial of service (crash).
References
http://www.asterisk.org/files/ASA-2007-011.pdf x_refsource_CONFIRM
http://bugs.digium.com/view.php?id=9313 x_refsource_MISC
http://www.novell.com/linux/security/advisories/2007_34_asterisk.html vendor-advisory, x_refsource_SUSE
http://www.securitytracker.com/id?1017954 vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/bid/24359 vdb-entry, x_refsource_BID
http://www.securityfocus.com/archive/1/466882/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/25582 third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/33892 vdb-entry, x_refsource_XF
http://securityreason.com/securityalert/2644 third-party-advisory, x_refsource_SREASON
http://www.debian.org/security/2007/dsa-1358 vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T13:33:28.286Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.asterisk.org/files/ASA-2007-011.pdf"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.digium.com/view.php?id=9313"
          },
          {
            "name": "SUSE-SA:2007:034",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
          },
          {
            "name": "1017954",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1017954"
          },
          {
            "name": "24359",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/24359"
          },
          {
            "name": "20070425 ASA-2007-011: Multiple problems in SIP channel parser handling response codes",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/466882/100/0/threaded"
          },
          {
            "name": "25582",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25582"
          },
          {
            "name": "asterisk-sip-response-dos(33892)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33892"
          },
          {
            "name": "2644",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/2644"
          },
          {
            "name": "DSA-1358",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2007/dsa-1358"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-04-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The SIP channel driver (chan_sip) in Asterisk before 1.2.18 and 1.4.x before 1.4.3 does not properly parse SIP UDP packets that do not contain a valid response code, which allows remote attackers to cause a denial of service (crash)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.asterisk.org/files/ASA-2007-011.pdf"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.digium.com/view.php?id=9313"
        },
        {
          "name": "SUSE-SA:2007:034",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
        },
        {
          "name": "1017954",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1017954"
        },
        {
          "name": "24359",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/24359"
        },
        {
          "name": "20070425 ASA-2007-011: Multiple problems in SIP channel parser handling response codes",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/466882/100/0/threaded"
        },
        {
          "name": "25582",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25582"
        },
        {
          "name": "asterisk-sip-response-dos(33892)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33892"
        },
        {
          "name": "2644",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/2644"
        },
        {
          "name": "DSA-1358",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2007/dsa-1358"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-2297",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The SIP channel driver (chan_sip) in Asterisk before 1.2.18 and 1.4.x before 1.4.3 does not properly parse SIP UDP packets that do not contain a valid response code, which allows remote attackers to cause a denial of service (crash)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.asterisk.org/files/ASA-2007-011.pdf",
              "refsource": "CONFIRM",
              "url": "http://www.asterisk.org/files/ASA-2007-011.pdf"
            },
            {
              "name": "http://bugs.digium.com/view.php?id=9313",
              "refsource": "MISC",
              "url": "http://bugs.digium.com/view.php?id=9313"
            },
            {
              "name": "SUSE-SA:2007:034",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
            },
            {
              "name": "1017954",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1017954"
            },
            {
              "name": "24359",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/24359"
            },
            {
              "name": "20070425 ASA-2007-011: Multiple problems in SIP channel parser handling response codes",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/466882/100/0/threaded"
            },
            {
              "name": "25582",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25582"
            },
            {
              "name": "asterisk-sip-response-dos(33892)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33892"
            },
            {
              "name": "2644",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/2644"
            },
            {
              "name": "DSA-1358",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2007/dsa-1358"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-2297",
    "datePublished": "2007-04-26T20:00:00",
    "dateReserved": "2007-04-26T00:00:00",
    "dateUpdated": "2024-08-07T13:33:28.286Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-47780 (GCVE-0-2025-47780)
Vulnerability from cvelistv5
Published
2025-05-22 16:56
Modified
2025-05-22 17:25
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk, trying to disallow shell commands to be run via the Asterisk command line interface (CLI) by configuring `cli_permissions.conf` (e.g. with the config line `deny=!*`) does not work which could lead to a security risk. If an administrator running an Asterisk instance relies on the `cli_permissions.conf` file to work and expects it to deny all attempts to execute shell commands, then this could lead to a security vulnerability. Versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk fix the issue.
Impacted products
Vendor Product Version
asterisk asterisk Version: < 18.9-cert14
Version: >= 18.10, < 18.26.2
Version: >= 20.0, < 20.7-cert5
Version: >= 20.8, < 20.14.1
Version: >= 21.0, < 21.9.1
Version: >= 22.0, < 22.4.1
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-47780",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-22T17:24:44.875844Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-22T17:25:09.045Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "asterisk",
          "vendor": "asterisk",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 18.9-cert14"
            },
            {
              "status": "affected",
              "version": "\u003e= 18.10, \u003c 18.26.2"
            },
            {
              "status": "affected",
              "version": "\u003e= 20.0, \u003c 20.7-cert5"
            },
            {
              "status": "affected",
              "version": "\u003e= 20.8, \u003c 20.14.1"
            },
            {
              "status": "affected",
              "version": "\u003e= 21.0, \u003c 21.9.1"
            },
            {
              "status": "affected",
              "version": "\u003e= 22.0, \u003c 22.4.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk, trying to disallow shell commands to be run via the Asterisk command line interface (CLI) by configuring `cli_permissions.conf` (e.g. with the config line `deny=!*`) does not work which could lead to a security risk. If an administrator running an Asterisk instance relies on the `cli_permissions.conf` file to work and expects it to deny all attempts to execute shell commands, then this could lead to a security vulnerability. Versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk fix the issue."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "LOCAL",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "privilegesRequired": "LOW",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "LOW",
            "vulnConfidentialityImpact": "LOW",
            "vulnIntegrityImpact": "LOW"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-22T16:56:28.937Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-c7p6-7mvq-8jq2",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-c7p6-7mvq-8jq2"
        }
      ],
      "source": {
        "advisory": "GHSA-c7p6-7mvq-8jq2",
        "discovery": "UNKNOWN"
      },
      "title": "cli_permissions.conf: deny option does not work for disallowing shell commands"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2025-47780",
    "datePublished": "2025-05-22T16:56:28.937Z",
    "dateReserved": "2025-05-09T19:49:35.620Z",
    "dateUpdated": "2025-05-22T17:25:09.045Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-4521 (GCVE-0-2007-4521)
Vulnerability from cvelistv5
Published
2007-08-28 01:00
Modified
2024-08-07 15:01
Severity ?
CWE
  • n/a
Summary
Asterisk Open Source 1.4.5 through 1.4.11, when configured to use an IMAP voicemail storage backend, allows remote attackers to cause a denial of service via an e-mail with an "invalid/corrupted" MIME body, which triggers a crash when the recipient listens to voicemail.
References
http://secunia.com/advisories/26601 third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id?1018606 vdb-entry, x_refsource_SECTRACK
http://downloads.digium.com/pub/asa/AST-2007-021.html x_refsource_CONFIRM
http://www.securityfocus.com/archive/1/477729/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/26602 third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/36261 vdb-entry, x_refsource_XF
http://www.vupen.com/english/advisories/2007/2978 vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/bid/25438 vdb-entry, x_refsource_BID
http://securityreason.com/securityalert/3065 third-party-advisory, x_refsource_SREASON
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:01:09.606Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "26601",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26601"
          },
          {
            "name": "1018606",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1018606"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://downloads.digium.com/pub/asa/AST-2007-021.html"
          },
          {
            "name": "20070824 AST-2007-021: Crash from invalid/corrupted MIME bodies when using voicemail with IMAP storage",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/477729/100/0/threaded"
          },
          {
            "name": "26602",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26602"
          },
          {
            "name": "asterisk-mime-body-dos(36261)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36261"
          },
          {
            "name": "ADV-2007-2978",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/2978"
          },
          {
            "name": "25438",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/25438"
          },
          {
            "name": "3065",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3065"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-08-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Asterisk Open Source 1.4.5 through 1.4.11, when configured to use an IMAP voicemail storage backend, allows remote attackers to cause a denial of service via an e-mail with an \"invalid/corrupted\" MIME body, which triggers a crash when the recipient listens to voicemail."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-15T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "26601",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26601"
        },
        {
          "name": "1018606",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1018606"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://downloads.digium.com/pub/asa/AST-2007-021.html"
        },
        {
          "name": "20070824 AST-2007-021: Crash from invalid/corrupted MIME bodies when using voicemail with IMAP storage",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/477729/100/0/threaded"
        },
        {
          "name": "26602",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26602"
        },
        {
          "name": "asterisk-mime-body-dos(36261)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36261"
        },
        {
          "name": "ADV-2007-2978",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/2978"
        },
        {
          "name": "25438",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/25438"
        },
        {
          "name": "3065",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3065"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-4521",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Asterisk Open Source 1.4.5 through 1.4.11, when configured to use an IMAP voicemail storage backend, allows remote attackers to cause a denial of service via an e-mail with an \"invalid/corrupted\" MIME body, which triggers a crash when the recipient listens to voicemail."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "26601",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26601"
            },
            {
              "name": "1018606",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1018606"
            },
            {
              "name": "http://downloads.digium.com/pub/asa/AST-2007-021.html",
              "refsource": "CONFIRM",
              "url": "http://downloads.digium.com/pub/asa/AST-2007-021.html"
            },
            {
              "name": "20070824 AST-2007-021: Crash from invalid/corrupted MIME bodies when using voicemail with IMAP storage",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/477729/100/0/threaded"
            },
            {
              "name": "26602",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26602"
            },
            {
              "name": "asterisk-mime-body-dos(36261)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36261"
            },
            {
              "name": "ADV-2007-2978",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/2978"
            },
            {
              "name": "25438",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/25438"
            },
            {
              "name": "3065",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3065"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-4521",
    "datePublished": "2007-08-28T01:00:00",
    "dateReserved": "2007-08-24T00:00:00",
    "dateUpdated": "2024-08-07T15:01:09.606Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-3763 (GCVE-0-2007-3763)
Vulnerability from cvelistv5
Published
2007-07-18 17:00
Modified
2024-08-07 14:28
Severity ?
CWE
  • n/a
Summary
The IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted (1) LAGRQ or (2) LAGRP frame that contains information elements of IAX frames, which results in a NULL pointer dereference when Asterisk does not properly set an associated variable.
References
http://ftp.digium.com/pub/asa/ASA-2007-015.pdf x_refsource_CONFIRM
http://secunia.com/advisories/26099 third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/24950 vdb-entry, x_refsource_BID
http://www.securitytracker.com/id?1018407 vdb-entry, x_refsource_SECTRACK
http://security.gentoo.org/glsa/glsa-200802-11.xml vendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/29051 third-party-advisory, x_refsource_SECUNIA
http://bugs.gentoo.org/show_bug.cgi?id=185713 x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2007/2563 vdb-entry, x_refsource_VUPEN
http://www.debian.org/security/2007/dsa-1358 vendor-advisory, x_refsource_DEBIAN
http://www.novell.com/linux/security/advisories/2007_15_sr.html vendor-advisory, x_refsource_SUSE
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:28:52.493Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ftp.digium.com/pub/asa/ASA-2007-015.pdf"
          },
          {
            "name": "26099",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26099"
          },
          {
            "name": "24950",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/24950"
          },
          {
            "name": "1018407",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1018407"
          },
          {
            "name": "GLSA-200802-11",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml"
          },
          {
            "name": "29051",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29051"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713"
          },
          {
            "name": "ADV-2007-2563",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/2563"
          },
          {
            "name": "DSA-1358",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2007/dsa-1358"
          },
          {
            "name": "SUSE-SR:2007:015",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-07-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted (1) LAGRQ or (2) LAGRP frame that contains information elements of IAX frames, which results in a NULL pointer dereference when Asterisk does not properly set an associated variable."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-07-27T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ftp.digium.com/pub/asa/ASA-2007-015.pdf"
        },
        {
          "name": "26099",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26099"
        },
        {
          "name": "24950",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/24950"
        },
        {
          "name": "1018407",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1018407"
        },
        {
          "name": "GLSA-200802-11",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml"
        },
        {
          "name": "29051",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29051"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713"
        },
        {
          "name": "ADV-2007-2563",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/2563"
        },
        {
          "name": "DSA-1358",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2007/dsa-1358"
        },
        {
          "name": "SUSE-SR:2007:015",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-3763",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted (1) LAGRQ or (2) LAGRP frame that contains information elements of IAX frames, which results in a NULL pointer dereference when Asterisk does not properly set an associated variable."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://ftp.digium.com/pub/asa/ASA-2007-015.pdf",
              "refsource": "CONFIRM",
              "url": "http://ftp.digium.com/pub/asa/ASA-2007-015.pdf"
            },
            {
              "name": "26099",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26099"
            },
            {
              "name": "24950",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/24950"
            },
            {
              "name": "1018407",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1018407"
            },
            {
              "name": "GLSA-200802-11",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml"
            },
            {
              "name": "29051",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29051"
            },
            {
              "name": "http://bugs.gentoo.org/show_bug.cgi?id=185713",
              "refsource": "CONFIRM",
              "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713"
            },
            {
              "name": "ADV-2007-2563",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/2563"
            },
            {
              "name": "DSA-1358",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2007/dsa-1358"
            },
            {
              "name": "SUSE-SR:2007:015",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-3763",
    "datePublished": "2007-07-18T17:00:00",
    "dateReserved": "2007-07-13T00:00:00",
    "dateUpdated": "2024-08-07T14:28:52.493Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-2294 (GCVE-0-2007-2294)
Vulnerability from cvelistv5
Published
2007-04-26 20:00
Modified
2024-08-07 13:33
Severity ?
CWE
  • n/a
Summary
The Manager Interface in Asterisk before 1.2.18 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (crash) by using MD5 authentication to authenticate a user that does not have a password defined in manager.conf, resulting in a NULL pointer dereference.
References
http://www.vupen.com/english/advisories/2007/1534 vdb-entry, x_refsource_VUPEN
http://www.securitytracker.com/id?1017955 vdb-entry, x_refsource_SECTRACK
http://www.novell.com/linux/security/advisories/2007_34_asterisk.html vendor-advisory, x_refsource_SUSE
http://www.osvdb.org/35369 vdb-entry, x_refsource_OSVDB
http://securityreason.com/securityalert/2646 third-party-advisory, x_refsource_SREASON
http://secunia.com/advisories/25582 third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/33886 vdb-entry, x_refsource_XF
http://secunia.com/advisories/24977 third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/23649 vdb-entry, x_refsource_BID
http://www.debian.org/security/2007/dsa-1358 vendor-advisory, x_refsource_DEBIAN
http://www.securityfocus.com/archive/1/466911/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://www.asterisk.org/files/ASA-2007-012.pdf x_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T13:33:28.299Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2007-1534",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/1534"
          },
          {
            "name": "1017955",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1017955"
          },
          {
            "name": "SUSE-SA:2007:034",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
          },
          {
            "name": "35369",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/35369"
          },
          {
            "name": "2646",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/2646"
          },
          {
            "name": "25582",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25582"
          },
          {
            "name": "asterisk-interface-dos(33886)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33886"
          },
          {
            "name": "24977",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24977"
          },
          {
            "name": "23649",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/23649"
          },
          {
            "name": "DSA-1358",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2007/dsa-1358"
          },
          {
            "name": "20070425 ASA-2007-012: Remote Crash Vulnerability in Manager Interface",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/466911/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.asterisk.org/files/ASA-2007-012.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-04-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Manager Interface in Asterisk before 1.2.18 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (crash) by using MD5 authentication to authenticate a user that does not have a password defined in manager.conf, resulting in a NULL pointer dereference."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2007-1534",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/1534"
        },
        {
          "name": "1017955",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1017955"
        },
        {
          "name": "SUSE-SA:2007:034",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
        },
        {
          "name": "35369",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/35369"
        },
        {
          "name": "2646",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/2646"
        },
        {
          "name": "25582",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25582"
        },
        {
          "name": "asterisk-interface-dos(33886)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33886"
        },
        {
          "name": "24977",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24977"
        },
        {
          "name": "23649",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/23649"
        },
        {
          "name": "DSA-1358",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2007/dsa-1358"
        },
        {
          "name": "20070425 ASA-2007-012: Remote Crash Vulnerability in Manager Interface",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/466911/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.asterisk.org/files/ASA-2007-012.pdf"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-2294",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Manager Interface in Asterisk before 1.2.18 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (crash) by using MD5 authentication to authenticate a user that does not have a password defined in manager.conf, resulting in a NULL pointer dereference."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2007-1534",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/1534"
            },
            {
              "name": "1017955",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1017955"
            },
            {
              "name": "SUSE-SA:2007:034",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
            },
            {
              "name": "35369",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/35369"
            },
            {
              "name": "2646",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/2646"
            },
            {
              "name": "25582",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25582"
            },
            {
              "name": "asterisk-interface-dos(33886)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33886"
            },
            {
              "name": "24977",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24977"
            },
            {
              "name": "23649",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/23649"
            },
            {
              "name": "DSA-1358",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2007/dsa-1358"
            },
            {
              "name": "20070425 ASA-2007-012: Remote Crash Vulnerability in Manager Interface",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/466911/100/0/threaded"
            },
            {
              "name": "http://www.asterisk.org/files/ASA-2007-012.pdf",
              "refsource": "CONFIRM",
              "url": "http://www.asterisk.org/files/ASA-2007-012.pdf"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-2294",
    "datePublished": "2007-04-26T20:00:00",
    "dateReserved": "2007-04-26T00:00:00",
    "dateUpdated": "2024-08-07T13:33:28.299Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-37457 (GCVE-0-2023-37457)
Vulnerability from cvelistv5
Published
2023-12-14 19:43
Modified
2025-02-13 17:01
CWE
  • CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Summary
Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk versions 18.20.0 and prior, 20.5.0 and prior, and 21.0.0; as well as ceritifed-asterisk 18.9-cert5 and prior, the 'update' functionality of the PJSIP_HEADER dialplan function can exceed the available buffer space for storing the new value of a header. By doing so this can overwrite memory or cause a crash. This is not externally exploitable, unless dialplan is explicitly written to update a header based on data from an outside source. If the 'update' functionality is not used the vulnerability does not occur. A patch is available at commit a1ca0268254374b515fa5992f01340f7717113fa.
Impacted products
Vendor Product Version
asterisk asterisk Version: <= 18.20.0
Version: >= 19.0.0, <= 20.5.0
Version: = 21.0.0
Version: <= 18.9-cert5
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T17:16:30.273Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-98rc-4j27-74hh",
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-98rc-4j27-74hh"
          },
          {
            "name": "https://github.com/asterisk/asterisk/commit/a1ca0268254374b515fa5992f01340f7717113fa",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/asterisk/asterisk/commit/a1ca0268254374b515fa5992f01340f7717113fa"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "asterisk",
          "vendor": "asterisk",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c= 18.20.0"
            },
            {
              "status": "affected",
              "version": "\u003e= 19.0.0, \u003c= 20.5.0"
            },
            {
              "status": "affected",
              "version": "= 21.0.0"
            },
            {
              "status": "affected",
              "version": "\u003c= 18.9-cert5"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk versions 18.20.0 and prior, 20.5.0 and prior, and 21.0.0; as well as ceritifed-asterisk 18.9-cert5 and prior, the \u0027update\u0027 functionality of the PJSIP_HEADER dialplan function can exceed the available buffer space for storing the new value of a header. By doing so this can overwrite memory or cause a crash. This is not externally exploitable, unless dialplan is explicitly written to update a header based on data from an outside source. If the \u0027update\u0027 functionality is not used the vulnerability does not occur. A patch is available at commit a1ca0268254374b515fa5992f01340f7717113fa."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-120",
              "description": "CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-29T00:06:20.393Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-98rc-4j27-74hh",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-98rc-4j27-74hh"
        },
        {
          "name": "https://github.com/asterisk/asterisk/commit/a1ca0268254374b515fa5992f01340f7717113fa",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/asterisk/asterisk/commit/a1ca0268254374b515fa5992f01340f7717113fa"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html"
        }
      ],
      "source": {
        "advisory": "GHSA-98rc-4j27-74hh",
        "discovery": "UNKNOWN"
      },
      "title": "Asterisk\u0027s PJSIP_HEADER dialplan function can overwrite memory/cause crash when using \u0027update\u0027"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2023-37457",
    "datePublished": "2023-12-14T19:43:30.945Z",
    "dateReserved": "2023-07-06T13:01:36.996Z",
    "dateUpdated": "2025-02-13T17:01:26.636Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2007-07-18 17:30
Modified
2025-04-09 00:30
Severity ?
Summary
The Skinny channel driver (chan_skinny) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a certain data length value in a crafted packet, which results in an "overly large memcpy."
References
cve@mitre.orghttp://bugs.gentoo.org/show_bug.cgi?id=185713
cve@mitre.orghttp://ftp.digium.com/pub/asa/ASA-2007-016.pdfPatch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26099
cve@mitre.orghttp://secunia.com/advisories/29051
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200802-11.xml
cve@mitre.orghttp://www.debian.org/security/2007/dsa-1358
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_15_sr.html
cve@mitre.orghttp://www.securityfocus.com/bid/24950
cve@mitre.orghttp://www.securitytracker.com/id?1018407
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/2563
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/35478
af854a3a-2127-422b-91ae-364da2661108http://bugs.gentoo.org/show_bug.cgi?id=185713
af854a3a-2127-422b-91ae-364da2661108http://ftp.digium.com/pub/asa/ASA-2007-016.pdfPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26099
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29051
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200802-11.xml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1358
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_15_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/24950
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1018407
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2563
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/35478



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "54F50B72-EFB3-448F-A2B8-C2BE4D4BF341",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "69BE50A7-FCA8-470A-B212-A516224306EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E306F943-ECA2-41C8-8C5D-F6A3D68ECE79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C309D90-24ED-4DC7-A770-783A7E28705F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B6DFD0D-86CE-4423-A0F4-C3581F916038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "77255177-4EB2-47F5-8B3A-F6164C3C8173",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2145ECD7-D734-4D58-8474-2F38DF9DB94F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "38C3AAB7-EA93-40BA-8ADE-380DA3520747",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E97310AF-E163-4C4F-A0BE-2940A67C336B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta2:*:*:*:*:*:*:*",
              "matchCriteriaId": "66A7A018-4EB6-4C15-9A22-E4299A6919C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7A7F90E-4600-4058-BB10-E39BE8F4968F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5722AD0B-B329-4DA3-A251-A18DD6EE505E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B8E66C-B2EB-4F1F-9226-07A957885D8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECD3CBC1-1371-440A-9EA1-7495A4FA2C49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B4841AD-96B7-4518-AC3E-3D23C88C083B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C89A173C-C64A-440F-BCC6-EDE692521171",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C716CAB8-5F2D-44DA-982B-3A47B3B59A1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0FABB45-93A9-49BB-93DA-D13305E2FF84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F82331-A7C1-4166-AE45-A83BD7FC3D25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "26A10E99-3A8C-430A-8FB6-4A55E01A00E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5DF84B2-A104-4FA2-8B02-D243D76ACEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4BA2270-DF93-48FB-A90F-DFBFED05F051",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4FE0264-95E4-4B75-8904-369035DEA2F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "593AA737-5AF3-4F7C-B74B-D3F37701C435",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D942B911-979A-4AC3-93D6-07E420171E77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.4_2007-04-27:*:*:*:*:*:*:*",
              "matchCriteriaId": "465DB1C7-D5DD-4A2D-8506-8642AB8363C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "181C8E98-2138-4BFC-B6B0-1DA270AEE7F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:a:*:business:*:*:*:*:*",
              "matchCriteriaId": "C6702046-43CF-4C84-9F76-24716C9F7D20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.2:*:business:*:*:*:*:*",
              "matchCriteriaId": "524CF00B-1B36-4C1F-80B4-28349891669B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.3:*:business:*:*:*:*:*",
              "matchCriteriaId": "2942FA48-42CE-4E67-A5BF-7852652EDE28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.2.0:*:business:*:*:*:*:*",
              "matchCriteriaId": "4160A834-9194-474C-819B-60627E470D13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C150564-406F-4B49-AEF8-0F2887738E4D",
              "versionEndIncluding": "0.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B12A09BE-1EE0-46D5-B3F0-E8847409A49A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A5A734E-1DD3-4924-8AC1-97048FA3270F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9282AC42-E98A-4BC2-B46D-15B5776C961F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "83DBFD69-2500-46C1-827C-1493CF896F49",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Skinny channel driver (chan_skinny) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a certain data length value in a crafted packet, which results in an \"overly large memcpy.\""
    },
    {
      "lang": "es",
      "value": "El controlador de canal Skinny (chan_skinny) en Asterisk anterior a 1.2.22 y 1.4.x anterior a 1.4.8, Business Edition anterior a B.2.2.1, AsteriskNOW anterior a la beta7, Appliance Developer Kit anterior a 0.5.0, y s800i anterior a 1.0.2 permite a atacantes remotos provocar denegaci\u00f3n de servicio (caida) a trav\u00e9s de ciertos valores de longitudes de datos en un paquete manipulado, lo cual deriva en un \"copia de memoria demasiado larga\"."
    }
  ],
  "id": "CVE-2007-3764",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-07-18T17:30:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://ftp.digium.com/pub/asa/ASA-2007-016.pdf"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26099"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29051"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2007/dsa-1358"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/24950"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1018407"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/2563"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35478"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://ftp.digium.com/pub/asa/ASA-2007-016.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26099"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29051"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1358"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/24950"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1018407"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2563"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35478"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-08-09 21:17
Modified
2025-04-09 00:30
Severity ?
Summary
The Skinny channel driver (chan_skinny) in Asterisk Open Source before 1.4.10, AsteriskNOW before beta7, Appliance Developer Kit before 0.7.0, and Appliance s800i before 1.0.3 allows remote authenticated users to cause a denial of service (application crash) via a CAPABILITIES_RES_MESSAGE packet with a capabilities count larger than the capabilities_res_message array population.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28786BB7-9F94-4193-81FC-83B836B9B530",
              "versionEndIncluding": "1.4.9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "39776C64-0067-4EBD-A5DD-6B7FB17B7603",
              "versionEndIncluding": "0.6.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisknow:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C896A32E-906D-4AD0-A00B-11DC064CBA6E",
              "versionEndIncluding": "beta_6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:s800i:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CE11A7E-2893-47E4-897B-28BBAD984858",
              "versionEndIncluding": "1.0.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Skinny channel driver (chan_skinny) in Asterisk Open Source before 1.4.10, AsteriskNOW before beta7, Appliance Developer Kit before 0.7.0, and Appliance s800i before 1.0.3 allows remote authenticated users to cause a denial of service (application crash) via a CAPABILITIES_RES_MESSAGE packet with a capabilities count larger than the capabilities_res_message array population."
    },
    {
      "lang": "es",
      "value": "El dispositivo de canal Skinny (chan_skinny) en el Asterisk Open Source anterior al 1.4.10, el AsteriskNOW anterior al beta7, el Appliance Developer Kit anterior al 0.7.0 y el Appliance s800i before 1.0.3 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s del paquete CAPABILITIES_RES_MESSAGE  con una capacidad de escrutinio mayor que el array capabilities_res_message de poblaci\u00f3n."
    }
  ],
  "id": "CVE-2007-4280",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-08-09T21:17:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://downloads.digium.com/pub/asa/ASA-2007-019.pdf"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26340"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/25228"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1018536"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/2808"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35870"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://downloads.digium.com/pub/asa/ASA-2007-019.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26340"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/25228"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1018536"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2808"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35870"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-08-28 01:17
Modified
2025-04-09 00:30
Severity ?
Summary
Asterisk Open Source 1.4.5 through 1.4.11, when configured to use an IMAP voicemail storage backend, allows remote attackers to cause a denial of service via an e-mail with an "invalid/corrupted" MIME body, which triggers a crash when the recipient listens to voicemail.
Impacted products
Vendor Product Version
asterisk asterisk 1.4.5
asterisk asterisk 1.4.6
asterisk asterisk 1.4.7
asterisk asterisk 1.4.8
asterisk asterisk 1.4.9
asterisk asterisk 1.4.10
asterisk asterisk 1.4.11



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F4BA849-E092-404A-92CD-44C2D99AE971",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C7014B4-1860-49AD-9469-9954C3CC01C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D1F0056-0945-476C-982E-7B41EB420A99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A53DEC9D-B288-42CD-9387-57315AC98D72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "89C1F33F-27B6-4C56-92FF-EB2861ABBC22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E07CF3-073D-4705-96A6-13367D4F5CAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "18D19CB0-E3D7-40DB-B0C0-B62BB6075267",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Asterisk Open Source 1.4.5 through 1.4.11, when configured to use an IMAP voicemail storage backend, allows remote attackers to cause a denial of service via an e-mail with an \"invalid/corrupted\" MIME body, which triggers a crash when the recipient listens to voicemail."
    },
    {
      "lang": "es",
      "value": "Asterisk Open Source 1.4.5 hasta la 1.4.11, cuando la configuraci\u00f3n utiliza un \t\r\nalmacenamiento de correo por voz (voicemail) del IMAP backend, permite a atacantes remotos provocar denegaci\u00f3n de servicio a trav\u00e9s de un correo electr\u00f3nico con un cuerpo MIME \" \"inv\u00e1lido/corrupto\", lo cual dispara una caida cuando el recipiente escucha en el correo por voz (voicemail)."
    }
  ],
  "id": "CVE-2007-4521",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-08-28T01:17:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://downloads.digium.com/pub/asa/AST-2007-021.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26601"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26602"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/3065"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/477729/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/25438"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1018606"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/2978"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36261"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://downloads.digium.com/pub/asa/AST-2007-021.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26601"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26602"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/3065"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/477729/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/25438"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1018606"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2978"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36261"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-03-22 23:19
Modified
2025-04-09 00:30
Severity ?
Summary
The Asterisk Extension Language (AEL) in pbx/pbx_ael.c in Asterisk does not properly generate extensions, which allows remote attackers to execute arbitrary extensions and have an unknown impact by specifying an invalid extension in a certain form.
Impacted products
Vendor Product Version
asterisk asterisk 1.2.13



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F82331-A7C1-4166-AE45-A83BD7FC3D25",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Asterisk Extension Language (AEL) in pbx/pbx_ael.c in Asterisk does not properly generate extensions, which allows remote attackers to execute arbitrary extensions and have an unknown impact by specifying an invalid extension in a certain form."
    },
    {
      "lang": "es",
      "value": "El Lenguaje de Extensi\u00f3n de Asterisk (AEL) en pbx/pbx_ael.c de Asterisk no genera extensiones apropiadamente, lo cual permite a atacantes remotos ejecutar extensiones de su elecci\u00f3n y tener un impacto desconocido especificando una extensi\u00f3n inv\u00e1lida en formularios concretos."
    }
  ],
  "id": "CVE-2007-1595",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-03-22T23:19:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://bugs.digium.com/view.php?id=9316"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/24694"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25582"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://svn.digium.com/view/asterisk?rev=59073\u0026view=rev"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/23155"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/1123"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://bugs.digium.com/view.php?id=9316"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24694"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25582"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://svn.digium.com/view/asterisk?rev=59073\u0026view=rev"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/23155"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/1123"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-08-08 17:15
Modified
2024-09-16 20:23
Summary
Asterisk is an open source private branch exchange (PBX) and telephony toolkit. Prior to asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2, an AMI user with `write=originate` may change all configuration files in the `/etc/asterisk/` directory. This occurs because they are able to curl remote files and write them to disk, but are also able to append to existing files using the `FILE` function inside the `SET` application. This issue may result in privilege escalation, remote code execution and/or blind server-side request forgery with arbitrary protocol. Asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2 contain a fix for this issue.
Impacted products
Vendor Product Version
asterisk asterisk *
asterisk asterisk *
asterisk asterisk 21.4.0
asterisk certified_asterisk 13.13.0
asterisk certified_asterisk 13.13.0
asterisk certified_asterisk 13.13.0
asterisk certified_asterisk 13.13.0
asterisk certified_asterisk 13.13.0
asterisk certified_asterisk 13.13.0
asterisk certified_asterisk 13.13.0
asterisk certified_asterisk 13.13.0
asterisk certified_asterisk 13.13.0
asterisk certified_asterisk 13.13.0
asterisk certified_asterisk 16.8
asterisk certified_asterisk 16.8
asterisk certified_asterisk 16.8
asterisk certified_asterisk 16.8
asterisk certified_asterisk 16.8
asterisk certified_asterisk 16.8
asterisk certified_asterisk 16.8
asterisk certified_asterisk 16.8
asterisk certified_asterisk 16.8
asterisk certified_asterisk 16.8
asterisk certified_asterisk 16.8
asterisk certified_asterisk 16.8
asterisk certified_asterisk 16.8
asterisk certified_asterisk 16.8
asterisk certified_asterisk 16.8.0
asterisk certified_asterisk 16.8.0
asterisk certified_asterisk 16.8.0
asterisk certified_asterisk 16.8.0
asterisk certified_asterisk 16.8.0
asterisk certified_asterisk 16.8.0
asterisk certified_asterisk 16.8.0
asterisk certified_asterisk 16.8.0
asterisk certified_asterisk 16.8.0
asterisk certified_asterisk 16.8.0
asterisk certified_asterisk 16.8.0
asterisk certified_asterisk 16.8.0
asterisk certified_asterisk 16.8.0
asterisk certified_asterisk 18.9
asterisk certified_asterisk 18.9
asterisk certified_asterisk 18.9
asterisk certified_asterisk 18.9
asterisk certified_asterisk 18.9
asterisk certified_asterisk 18.9
asterisk certified_asterisk 18.9
asterisk certified_asterisk 18.9
asterisk certified_asterisk 18.9
asterisk certified_asterisk 18.9
asterisk certified_asterisk 18.9
asterisk certified_asterisk 18.9
asterisk certified_asterisk 18.9
asterisk certified_asterisk 20.7
asterisk certified_asterisk 20.7
asterisk certified_asterisk 20.7



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E883638-A227-4B23-ADEB-E54244B482F0",
              "versionEndExcluding": "18.24.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "525E1CCB-43F1-405D-96A9-A9D41D8F59CD",
              "versionEndExcluding": "20.9.1",
              "versionStartIncluding": "19.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:21.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8337584E-FAFD-456F-957C-7CDE4132E660",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:13.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C489FB-3A83-42D7-94A9-3C7D5B8F980C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1:*:*:*:*:*:*",
              "matchCriteriaId": "DD5636A9-1E9F-4DA7-8459-6B9257ADE0E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc1:*:*:*:*:*:*",
              "matchCriteriaId": "4DDBE806-CDD5-4981-B575-9EB58816CD7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc2:*:*:*:*:*:*",
              "matchCriteriaId": "A9676683-14B7-4489-9D18-C37365C323D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc3:*:*:*:*:*:*",
              "matchCriteriaId": "660E2F8C-A674-44EE-99AC-80E57A0681C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc4:*:*:*:*:*:*",
              "matchCriteriaId": "6949CB9E-8282-4E9D-9DD0-889E3181C845",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert2:*:*:*:*:*:*",
              "matchCriteriaId": "B54BB82E-92EF-4D75-8E62-10CDC7C526DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert3:*:*:*:*:*:*",
              "matchCriteriaId": "E759A991-D72D-4FCA-B4F5-3B51D63A31D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:13.13.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D4E1A5B3-8385-4376-A145-1E1CC0E80818",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:13.13.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3E4E78FF-000E-4DA8-8539-2C5507C09BB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8:cert1-rc1:*:*:*:*:*:*",
              "matchCriteriaId": "20998BF5-7014-444C-A221-5B989987A7F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8:cert1-rc2:*:*:*:*:*:*",
              "matchCriteriaId": "245E902A-1583-4482-9AD7-F0C5AF38764E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8:cert1-rc3:*:*:*:*:*:*",
              "matchCriteriaId": "282CF259-FEE3-44FC-808E-D96CCF48BFCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8:cert1-rc4:*:*:*:*:*:*",
              "matchCriteriaId": "BEF5DDD6-7C6B-4E72-B3F3-7330C4488CA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8:cert1-rc5:*:*:*:*:*:*",
              "matchCriteriaId": "675FED60-01B9-4A6F-B20C-D642121B873C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8:cert10:*:*:*:*:*:*",
              "matchCriteriaId": "3D6A228C-260F-484C-B169-EEDB0C66CB62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8:cert11:*:*:*:*:*:*",
              "matchCriteriaId": "7FFE0158-47D4-4FB4-84C8-49E67A181545",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8:cert12:*:*:*:*:*:*",
              "matchCriteriaId": "CAC40CC0-5EC1-4F05-B1D1-7D06D2E10B5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8:cert13:*:*:*:*:*:*",
              "matchCriteriaId": "3CDDFE32-9BAE-400C-8F6B-9792E9E0711C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8:cert14:*:*:*:*:*:*",
              "matchCriteriaId": "EB3952E1-6BA6-46D7-92F6-168EE8351E93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8:cert4-rc1:*:*:*:*:*:*",
              "matchCriteriaId": "67D6AA96-3579-41F5-B871-DA01F12CC8F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8:cert4-rc2:*:*:*:*:*:*",
              "matchCriteriaId": "66E7DD42-CBC6-44F1-B06D-0B89CF624D51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8:cert4-rc3:*:*:*:*:*:*",
              "matchCriteriaId": "1EC0C26E-CCD2-4AEE-A35C-7A4DDA2E657E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8:cert4-rc4:*:*:*:*:*:*",
              "matchCriteriaId": "3CE9EC96-7A16-4989-98BC-440E9282FAC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "335EF1B5-AD89-48E2-AB2C-BF376BC36F77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert1:*:*:*:*:*:*",
              "matchCriteriaId": "E64BCD44-2298-4710-9CC3-DF82E6A8DF94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert10:*:*:*:*:*:*",
              "matchCriteriaId": "91CCAB0C-C0F8-4619-AAE1-F6F13FF31570",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert11:*:*:*:*:*:*",
              "matchCriteriaId": "F2B7CBB3-E037-416B-AD16-9A553D6A4775",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert12:*:*:*:*:*:*",
              "matchCriteriaId": "DE7DDFE1-6A06-477A-AB45-D00053CFA7EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert2:*:*:*:*:*:*",
              "matchCriteriaId": "A35C117A-6EFB-42EB-AD2A-EA7866606927",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert3:*:*:*:*:*:*",
              "matchCriteriaId": "40003CBE-792F-4875-9E60-6F1CE0BBAA8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert4:*:*:*:*:*:*",
              "matchCriteriaId": "46A7AA7B-13F2-496A-99ED-1CC13234E8CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert5:*:*:*:*:*:*",
              "matchCriteriaId": "147663CB-B48D-4D89-96BF-F92FF96F347F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert6:*:*:*:*:*:*",
              "matchCriteriaId": "27DBBC83-930A-4ECE-8C1E-47481D881B0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert7:*:*:*:*:*:*",
              "matchCriteriaId": "B987A13D-A363-4DCE-BBA1-E35E81ACBA60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert8:*:*:*:*:*:*",
              "matchCriteriaId": "01A5B7F9-FAD2-4C0C-937D-CF1086512130",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert9:*:*:*:*:*:*",
              "matchCriteriaId": "F60B4271-F987-4932-86EE-45ED099661E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:18.9:cert1:*:*:*:*:*:*",
              "matchCriteriaId": "4183072E-F5A2-4137-82B4-B066AC8DAAA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:18.9:cert1-rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3ABB4F01-021F-46C1-ABD4-412C7D40C52B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:18.9:cert10:*:*:*:*:*:*",
              "matchCriteriaId": "7B8A221A-E9DD-45EC-8DD6-7AFBC5A0B0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:18.9:cert2:*:*:*:*:*:*",
              "matchCriteriaId": "32177FB5-4C13-4E0C-AB67-F2B2F322581E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:18.9:cert3:*:*:*:*:*:*",
              "matchCriteriaId": "795DA8B6-FACE-4CC2-8262-1733A34F5593",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:18.9:cert4:*:*:*:*:*:*",
              "matchCriteriaId": "CDBDB4E6-51AC-4707-85DF-9F76EF6629BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:18.9:cert5:*:*:*:*:*:*",
              "matchCriteriaId": "BEC796F2-A349-4CCA-9343-5251DCA781A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:18.9:cert6:*:*:*:*:*:*",
              "matchCriteriaId": "3AC09F75-406C-4699-A4D7-661383A05C05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:18.9:cert7:*:*:*:*:*:*",
              "matchCriteriaId": "02F5B177-0509-4CF7-A555-B9F41F50AE5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:18.9:cert8:*:*:*:*:*:*",
              "matchCriteriaId": "237890E9-1AAB-4D02-801E-BC0C68A70718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:18.9:cert8-rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D3064399-A01E-4E08-A4AE-4BA33A4928F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:18.9:cert8-rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FFA59ED7-2EE0-45EC-A794-8FA29B403A1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:18.9:cert9:*:*:*:*:*:*",
              "matchCriteriaId": "C727C1DB-0287-412E-9107-AF276FF3AB2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:20.7:cert1:*:*:*:*:*:*",
              "matchCriteriaId": "3520F2B3-3E3F-4222-AA97-B2F7F7BD30A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:20.7:cert1-rc1:*:*:*:*:*:*",
              "matchCriteriaId": "56923D44-D1D5-4A79-AA36-5A0C45D22250",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:certified_asterisk:20.7:cert1-rc2:*:*:*:*:*:*",
              "matchCriteriaId": "C669C229-8050-4938-8A05-11BFAB8D51FB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Asterisk is an open source private branch exchange (PBX) and telephony toolkit. Prior to asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2, an AMI user with `write=originate` may change all configuration files in the `/etc/asterisk/` directory. This occurs because they are able to curl remote files and write them to disk, but are also able to append to existing files using the `FILE` function inside the `SET` application. This issue may result in privilege escalation, remote code execution and/or blind server-side request forgery with arbitrary protocol. Asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2 contain a fix for this issue."
    },
    {
      "lang": "es",
      "value": "Asterisk es un kit de herramientas de telefon\u00eda y centralita privada (PBX) de c\u00f3digo abierto. Antes de las versiones de asterisk 18.24.2, 20.9.2 y 21.4.2 y de las versiones de asterisco certificado 18.9-cert11 y 20.7-cert2, un usuario de AMI con `write=originate` pod\u00eda cambiar todos los archivos de configuraci\u00f3n en `/etc/asterisk. /` directorio. Esto ocurre porque pueden curvar archivos remotos y escribirlos en el disco, pero tambi\u00e9n pueden agregarlos a archivos existentes usando la funci\u00f3n `FILE` dentro de la aplicaci\u00f3n `SET`. Este problema puede provocar una escalada de privilegios, la ejecuci\u00f3n remota de c\u00f3digo y/o blind server-side request forgery con un protocolo arbitrario. Las versiones de Asterisk 18.24.2, 20.9.2 y 21.4.2 y las versiones de asterisco certificado 18.9-cert11 y 20.7-cert2 contienen una soluci\u00f3n para este problema."
    }
  ],
  "id": "CVE-2024-42365",
  "lastModified": "2024-09-16T20:23:18.407",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 7.4,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 3.1,
        "impactScore": 3.7,
        "source": "security-advisories@github.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-08-08T17:15:19.340",
  "references": [
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://github.com/asterisk/asterisk/blob/14367caaf7241df1eceea7c45c5b261989c2c6db/main/manager.c#L6426"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://github.com/asterisk/asterisk/blob/7d28165cb1b2d02d66e8693bd3fe23ee72fc55d8/main/manager.c#L6426"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/asterisk/asterisk/commit/42a2f4ccfa2c7062a15063e765916b3332e34cc4"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/asterisk/asterisk/commit/7a0090325bfa9d778a39ae5f7d0a98109e4651c8"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/asterisk/asterisk/commit/b4063bf756272254b160b6d1bd6e9a3f8e16cc71"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/asterisk/asterisk/commit/bbe68db10ab8a80c29db383e4dfe14f6eafaf993"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/asterisk/asterisk/commit/faddd99f2b9408b524e5eb8a01589fe1fa282df2"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Exploit",
        "Technical Description",
        "Vendor Advisory"
      ],
      "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-c4cg-9275-6w44"
    }
  ],
  "sourceIdentifier": "security-advisories@github.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-267"
        },
        {
          "lang": "en",
          "value": "CWE-1220"
        }
      ],
      "source": "security-advisories@github.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-04-26 20:19
Modified
2025-04-09 00:30
Severity ?
Summary
The Manager Interface in Asterisk before 1.2.18 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (crash) by using MD5 authentication to authenticate a user that does not have a password defined in manager.conf, resulting in a NULL pointer dereference.
References
cve@mitre.orghttp://secunia.com/advisories/24977Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/25582
cve@mitre.orghttp://securityreason.com/securityalert/2646
cve@mitre.orghttp://www.asterisk.org/files/ASA-2007-012.pdf
cve@mitre.orghttp://www.debian.org/security/2007/dsa-1358
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_34_asterisk.html
cve@mitre.orghttp://www.osvdb.org/35369
cve@mitre.orghttp://www.securityfocus.com/archive/1/466911/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/23649
cve@mitre.orghttp://www.securitytracker.com/id?1017955
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/1534
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/33886
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24977Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25582
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/2646
af854a3a-2127-422b-91ae-364da2661108http://www.asterisk.org/files/ASA-2007-012.pdf
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1358
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_34_asterisk.html
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/35369
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/466911/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/23649
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1017955
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/1534
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/33886
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E97310AF-E163-4C4F-A0BE-2940A67C336B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta2:*:*:*:*:*:*:*",
              "matchCriteriaId": "66A7A018-4EB6-4C15-9A22-E4299A6919C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7A7F90E-4600-4058-BB10-E39BE8F4968F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5722AD0B-B329-4DA3-A251-A18DD6EE505E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B8E66C-B2EB-4F1F-9226-07A957885D8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECD3CBC1-1371-440A-9EA1-7495A4FA2C49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B4841AD-96B7-4518-AC3E-3D23C88C083B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C89A173C-C64A-440F-BCC6-EDE692521171",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C716CAB8-5F2D-44DA-982B-3A47B3B59A1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0FABB45-93A9-49BB-93DA-D13305E2FF84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F82331-A7C1-4166-AE45-A83BD7FC3D25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "26A10E99-3A8C-430A-8FB6-4A55E01A00E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5DF84B2-A104-4FA2-8B02-D243D76ACEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4BA2270-DF93-48FB-A90F-DFBFED05F051",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4FE0264-95E4-4B75-8904-369035DEA2F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "593AA737-5AF3-4F7C-B74B-D3F37701C435",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D942B911-979A-4AC3-93D6-07E420171E77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "181C8E98-2138-4BFC-B6B0-1DA270AEE7F6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Manager Interface in Asterisk before 1.2.18 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (crash) by using MD5 authentication to authenticate a user that does not have a password defined in manager.conf, resulting in a NULL pointer dereference."
    },
    {
      "lang": "es",
      "value": "El Manager Interface en Asterisk anterior a 1.2.18 y 1.4.x anterior a 1.4.3 permite a atacantes remotos provocar denegaci\u00f3n de servicio (caida) utilizando validaci\u00f3n MD5 para validar a un usuario que no tiene definida una contrase\u00f1a en manager.conf, dando como resultado un puntero no referencia NULL."
    }
  ],
  "evaluatorImpact": "Successful exploitation requires that the Management Interface is enabled and a user without a password is configured in the manager.conf file.",
  "id": "CVE-2007-2294",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-04-26T20:19:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24977"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25582"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/2646"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.asterisk.org/files/ASA-2007-012.pdf"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2007/dsa-1358"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/35369"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/466911/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/23649"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1017955"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/1534"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33886"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24977"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25582"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/2646"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.asterisk.org/files/ASA-2007-012.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1358"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/35369"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/466911/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/23649"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1017955"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/1534"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33886"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-02-04 20:15
Modified
2025-04-11 00:51
Severity ?
Summary
Asterisk Open Source 1.6.0.x before 1.6.0.22, 1.6.1.x before 1.6.1.14, and 1.6.2.x before 1.6.2.2, and Business Edition C.3 before C.3.3.2, allows remote attackers to cause a denial of service (daemon crash) via an SIP T.38 negotiation with an SDP FaxMaxDatagram field that is (1) missing, (2) modified to contain a negative number, or (3) modified to contain a large number.
References
cve@mitre.orghttp://downloads.asterisk.org/pub/security/AST-2010-001-1.6.0.diffPatch
cve@mitre.orghttp://downloads.asterisk.org/pub/security/AST-2010-001-1.6.1.diffPatch
cve@mitre.orghttp://downloads.asterisk.org/pub/security/AST-2010-001-1.6.2.diff
cve@mitre.orghttp://downloads.asterisk.org/pub/security/AST-2010-001.html
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2010-March/037679.html
cve@mitre.orghttp://secunia.com/advisories/38395Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/39096
cve@mitre.orghttp://securitytracker.com/id?1023532
cve@mitre.orghttp://www.securityfocus.com/archive/1/509327/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/38047
cve@mitre.orghttp://www.vupen.com/english/advisories/2010/0289Vendor Advisory
cve@mitre.orghttps://issues.asterisk.org/view.php?id=16517
cve@mitre.orghttps://issues.asterisk.org/view.php?id=16634
cve@mitre.orghttps://issues.asterisk.org/view.php?id=16724
af854a3a-2127-422b-91ae-364da2661108http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.0.diffPatch
af854a3a-2127-422b-91ae-364da2661108http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.1.diffPatch
af854a3a-2127-422b-91ae-364da2661108http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.2.diff
af854a3a-2127-422b-91ae-364da2661108http://downloads.asterisk.org/pub/security/AST-2010-001.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037679.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38395Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/39096
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1023532
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/509327/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/38047
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/0289Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://issues.asterisk.org/view.php?id=16517
af854a3a-2127-422b-91ae-364da2661108https://issues.asterisk.org/view.php?id=16634
af854a3a-2127-422b-91ae-364da2661108https://issues.asterisk.org/view.php?id=16724
Impacted products
Vendor Product Version
asterisk asterisk 1.6.0
asterisk asterisk 1.6.0.1
asterisk asterisk 1.6.0.2
asterisk asterisk 1.6.0.3
asterisk asterisk 1.6.0.5
asterisk asterisk 1.6.0.6
asterisk asterisk 1.6.0.7
asterisk asterisk 1.6.0.8
asterisk asterisk 1.6.0.9
asterisk asterisk 1.6.0.10
asterisk asterisk 1.6.0.12
asterisk asterisk 1.6.0.13
asterisk asterisk 1.6.0.14
asterisk asterisk 1.6.0.15
asterisk asterisk 1.6.0.16-rc1
asterisk asterisk 1.6.0.16-rc2
asterisk asterisk 1.6.0.17
asterisk asterisk 1.6.0.18
asterisk asterisk 1.6.0.18-rc1
asterisk asterisk 1.6.0.18-rc2
asterisk asterisk 1.6.0.18-rc3
asterisk asterisk 1.6.0.19
asterisk asterisk 1.6.0.20
asterisk asterisk 1.6.0.20-rc1
asterisk asterisk 1.6.0.21
asterisk asterisk 1.6.0.21-rc1
asterisk asterisk 1.6.1.0
asterisk asterisk 1.6.1.1
asterisk asterisk 1.6.1.2
asterisk asterisk 1.6.1.4
asterisk asterisk 1.6.1.5
asterisk asterisk 1.6.1.6
asterisk asterisk 1.6.1.7-rc1
asterisk asterisk 1.6.1.7-rc2
asterisk asterisk 1.6.1.8
asterisk asterisk 1.6.1.9
asterisk asterisk 1.6.1.10
asterisk asterisk 1.6.1.10-rc1
asterisk asterisk 1.6.1.10-rc2
asterisk asterisk 1.6.1.10-rc3
asterisk asterisk 1.6.1.11
asterisk asterisk 1.6.1.12
asterisk asterisk 1.6.1.12-rc1
asterisk asterisk 1.6.1.13
asterisk asterisk 1.6.1.13-rc1
asterisk asterisk 1.6.2.1
asterisk asterisk 1.6.2.1-rc1
asterisk asterisk 1.6.10-rc1
asterisk asterisk 1.6.10-rc2
asterisk asterisk c.3.1.0
asterisk asterisk c.3.1.1
asterisk asterisk c.3.2.2
asterisk asterisk c.3.3.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E1EFFF2-1982-47F8-AD13-F092EEAA6CDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F6B7EB6-7C40-4F9A-8740-C3047260F585",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E5A2517-8ACA-43B9-B40F-2178E1E6FB2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7CA5945-22BD-4C0B-B572-E8A4F97B0072",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "610ACBCE-07B7-4A6F-9D3F-F4BA787DC873",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC87EDE8-E27F-4423-A816-C68FD6E43217",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F465A7B8-599B-4DD6-91C3-AC532FC58C07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "683AE289-8941-4CB5-8F5D-AB004E2368E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "945F6B76-2970-4846-8480-1BB5CC6AAED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "43A01317-A0CB-4469-AB2A-810AD3F0ACF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "C346B14C-D023-4080-B283-0AFB7AE2707D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "88C2A2C9-18CD-4B6E-A9ED-30E26E44421D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1D797FD-9180-427B-B1D3-2137AA2A019A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5135FC8A-84CD-4020-A296-907725D2A7B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.0.16-rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "80497A77-FC5D-4F01-9809-9E4C08D7CD7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.0.16-rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FA1B6A5-5E17-414B-B83D-08A5012A57F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "57645851-EC85-44AE-BC8A-A1640D5012B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "653E068C-4F8F-43EB-849A-A9FCD16000F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.0.18-rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F167788D-4366-4606-8F6C-2DD0AE345288",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.0.18-rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E2D5A01-DDEA-40EB-ADAA-A92073746E0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.0.18-rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "08A4B790-EDC4-40B9-AFC3-C647E49A2E42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "58ACA45B-F10E-4D45-91C5-2C46BE11772E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F9676FE-3750-453E-9804-973072E04BB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.0.20-rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "05F8B5EE-3664-4F43-B6FD-92856067266F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AB2998-5654-4D74-95D3-C26B04C77FE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.0.21-rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "93F366A3-F3C6-4B66-B987-DDB1E2AFA6D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "94C2F7A6-388A-4C17-ABC3-8AA78EB9E21C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CCE62F1-803B-43AF-B367-26CEE18F22C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3A90DF9-FFC8-4724-85E2-1873C1945E1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BE3AE1B-E9A1-4318-AE88-EA47643A9845",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "53397CB5-77A4-423B-8094-DD9AAF14937A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3BDAEC9-5A52-4C8A-A746-659779EEC71B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.1.7-rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "13B84311-DF6D-44F7-9A14-4B754EE293B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.1.7-rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAA69EC7-9F9E-4BD3-ABFF-9D6E9B38FC8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "682C07DA-7537-4F68-9DF8-2E4615016B2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "49FD6C99-63D8-4B05-A2F1-8A30E96DFFBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E546955D-5107-4F4A-884C-1A0A1C26DCC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.1.10-rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "384FD027-C085-4FDC-89B0-45496A876FFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.1.10-rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A70428E6-3220-4983-86AD-EEAB32AE3049",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.1.10-rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "90378BB8-7817-4192-93BA-53BD12A44E80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "72A748AF-36B1-47DC-9132-DD44D5014E41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "99D4CF13-83F5-40CE-BF8A-C37582F72108",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.1.12-rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "26EA652F-F045-4872-A916-6145C7A6AC94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CDC89DD-96B1-458B-B8D6-958D8D42EF53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.1.13-rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA85B103-1763-4BE8-A8F2-D1AA1A79437B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "52F43F8F-BD5D-45EF-94D4-1405F2ACB31E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.2.1-rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC00ABF5-D79B-41CA-9451-5C5FB215BF80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.10-rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C9455CE-C01B-4C25-B8FB-B6BF46E6162D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6.10-rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1A8B75E-9299-40B6-925A-E0B11B358025",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:c.3.1.0:*:business:*:*:*:*:*",
              "matchCriteriaId": "E6B4EC4D-957C-4A93-B65C-10114845A226",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:c.3.1.1:*:business:*:*:*:*:*",
              "matchCriteriaId": "119C7D71-C02A-494D-8567-3BFC8BB84494",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:c.3.2.2:*:business:*:*:*:*:*",
              "matchCriteriaId": "0FF85A31-73C4-45E7-B42A-E653F6420F0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:c.3.3.3:*:business:*:*:*:*:*",
              "matchCriteriaId": "13B34567-05CD-4111-B28B-1AAA3B454635",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Asterisk Open Source 1.6.0.x before 1.6.0.22, 1.6.1.x before 1.6.1.14, and 1.6.2.x before 1.6.2.2, and Business Edition C.3 before C.3.3.2, allows remote attackers to cause a denial of service (daemon crash) via an SIP T.38 negotiation with an SDP FaxMaxDatagram field that is (1) missing, (2) modified to contain a negative number, or (3) modified to contain a large number."
    },
    {
      "lang": "es",
      "value": "Asterisk Open Source v1.6.0.x anterior v1.6.0.22, v1.6.1.x anterior v1.6.1.14, y v1.6.2.x anterior v1.6.2.2, y Business Edition vC.3 anterior vC.3.3.2, permite a atacantes remotos causar una denegaci\u00f3n de demonio (ca\u00edda de demonio) a trav\u00e9s de una negociaci\u00f3n SIP T.38 con un campo SDP FaxMaxDatagram que (1) perdido, (2) modificado para contener un n\u00famero negativo o (3) modificado para contener un n\u00famero largo."
    }
  ],
  "id": "CVE-2010-0441",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-02-04T20:15:24.030",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.0.diff"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.1.diff"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.2.diff"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://downloads.asterisk.org/pub/security/AST-2010-001.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037679.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38395"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/39096"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1023532"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/509327/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/38047"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/0289"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://issues.asterisk.org/view.php?id=16517"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://issues.asterisk.org/view.php?id=16634"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://issues.asterisk.org/view.php?id=16724"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.0.diff"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.1.diff"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.2.diff"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://downloads.asterisk.org/pub/security/AST-2010-001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037679.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38395"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/39096"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1023532"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/509327/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/38047"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/0289"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.asterisk.org/view.php?id=16517"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.asterisk.org/view.php?id=16634"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.asterisk.org/view.php?id=16724"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-08-22 01:17
Modified
2025-04-09 00:30
Severity ?
Summary
The SIP channel driver (chan_sip) in Asterisk Open Source 1.4.x before 1.4.11, AsteriskNOW before beta7, Asterisk Appliance Developer Kit 0.x before 0.8.0, and s800i (Asterisk Appliance) 1.x before 1.0.3 allows remote attackers to cause a denial of service (memory exhaustion) via a SIP dialog that causes a large number of history entries to be created.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28786BB7-9F94-4193-81FC-83B836B9B530",
              "versionEndIncluding": "1.4.9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8C03D5E-5EBE-42C9-BA54-10F1ED76D61C",
              "versionEndIncluding": "0.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisknow:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C896A32E-906D-4AD0-A00B-11DC064CBA6E",
              "versionEndIncluding": "beta_6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SIP channel driver (chan_sip) in Asterisk Open Source 1.4.x before 1.4.11, AsteriskNOW before beta7, Asterisk Appliance Developer Kit 0.x before 0.8.0, and s800i (Asterisk Appliance) 1.x before 1.0.3 allows remote attackers to cause a denial of service (memory exhaustion) via a SIP dialog that causes a large number of history entries to be created."
    },
    {
      "lang": "es",
      "value": "El controlador de canal SIP (chan_sip) en Asterisk Open Source 1.4.x anterior a 1.4.11, AsteriskNOW anterior a beta7, Asterisk Appliance Developer Kit 0.x anterior a 0.8.0, y s800i (Asterisk Appliance) 1.x anterior a 1.0.3 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (agotamiento de memoria) mediante un di\u00e1logo SIP que provoca que se cree un gran n\u00famero de entradas de hist\u00f3rico."
    }
  ],
  "id": "CVE-2007-4455",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-08-22T01:17:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://downloads.digium.com/pub/asa/AST-2007-020.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://seclists.org/fulldisclosure/2007/Aug/0393.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26553"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/3047"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/25392"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1018595"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/2953"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36145"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://downloads.digium.com/pub/asa/AST-2007-020.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/fulldisclosure/2007/Aug/0393.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26553"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/3047"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/25392"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1018595"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2953"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36145"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-07-22 23:41
Modified
2025-04-09 00:30
Severity ?
Summary
The IAX2 protocol implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (call-number exhaustion and CPU consumption) by quickly sending a large number of IAX2 (IAX) POKE requests.
References
cve@mitre.orghttp://downloads.digium.com/pub/security/AST-2008-010.html
cve@mitre.orghttp://downloads.securityfocus.com/vulnerabilities/exploits/30321.plExploit
cve@mitre.orghttp://secunia.com/advisories/31178
cve@mitre.orghttp://secunia.com/advisories/31194
cve@mitre.orghttp://secunia.com/advisories/34982
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200905-01.xml
cve@mitre.orghttp://www.securityfocus.com/archive/1/494675/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/30321Exploit
cve@mitre.orghttp://www.securitytracker.com/id?1020535
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/2168/references
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/43942
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html
af854a3a-2127-422b-91ae-364da2661108http://downloads.digium.com/pub/security/AST-2008-010.html
af854a3a-2127-422b-91ae-364da2661108http://downloads.securityfocus.com/vulnerabilities/exploits/30321.plExploit
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31178
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31194
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34982
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200905-01.xml
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/494675/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/30321Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1020535
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2168/references
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/43942
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html
Impacted products
Vendor Product Version
asterisk asterisk 0.1.0
asterisk asterisk 0.1.1
asterisk asterisk 0.1.2
asterisk asterisk 0.1.3
asterisk asterisk 0.1.4
asterisk asterisk 0.1.5
asterisk asterisk 0.1.6
asterisk asterisk 0.1.7
asterisk asterisk 0.1.8
asterisk asterisk 0.1.9
asterisk asterisk 0.1.9_1
asterisk asterisk 0.1.10
asterisk asterisk 0.1.11
asterisk asterisk 0.1.12
asterisk asterisk 0.2
asterisk asterisk 0.3
asterisk asterisk 0.4
asterisk asterisk 0.5.0
asterisk asterisk 0.7.0
asterisk asterisk 0.7.1
asterisk asterisk 0.7.2
asterisk asterisk 0.9.0
asterisk asterisk 1.0
asterisk asterisk 1.0
asterisk asterisk 1.0.1
asterisk asterisk 1.0.2
asterisk asterisk 1.0.3
asterisk asterisk 1.0.4
asterisk asterisk 1.0.5
asterisk asterisk 1.0.6
asterisk asterisk 1.0.7
asterisk asterisk 1.0.8
asterisk asterisk 1.0.9
asterisk asterisk 1.0.10
asterisk asterisk 1.0.11
asterisk asterisk 1.0.11.1
asterisk asterisk 1.0.12
asterisk asterisk 1.2.0_beta1
asterisk asterisk 1.2.0_beta2
asterisk asterisk 1.2.1
asterisk asterisk 1.2.2
asterisk asterisk 1.2.3
asterisk asterisk 1.2.4
asterisk asterisk 1.2.5
asterisk asterisk 1.2.6
asterisk asterisk 1.2.7
asterisk asterisk 1.2.7.1
asterisk asterisk 1.2.8
asterisk asterisk 1.2.9
asterisk asterisk 1.2.9.1
asterisk asterisk 1.2.10
asterisk asterisk 1.2.11
asterisk asterisk 1.2.12
asterisk asterisk 1.2.13
asterisk asterisk 1.2.14
asterisk asterisk 1.2.15
asterisk asterisk 1.2.16
asterisk asterisk 1.2.17
asterisk asterisk 1.2.18
asterisk asterisk 1.2.19
asterisk asterisk 1.2.20
asterisk asterisk 1.2.21
asterisk asterisk 1.2.22
asterisk asterisk 1.2.23
asterisk asterisk 1.2.24
asterisk asterisk 1.2.25
asterisk asterisk 1.2.26
asterisk asterisk 1.2.26.1
asterisk asterisk 1.2.26.2
asterisk asterisk 1.2.27
asterisk asterisk 1.2.28
asterisk asterisk 1.2.28.1
asterisk asterisk 1.2.29
asterisk asterisk 1.2.30
asterisk asterisk 1.4.1
asterisk asterisk 1.4.2
asterisk asterisk 1.4.3
asterisk asterisk 1.4.4
asterisk asterisk 1.4.4_2007-04-27
asterisk asterisk 1.4.5
asterisk asterisk 1.4.6
asterisk asterisk 1.4.7
asterisk asterisk 1.4.8
asterisk asterisk 1.4.9
asterisk asterisk 1.4.10
asterisk asterisk 1.4.11
asterisk asterisk 1.4.12
asterisk asterisk 1.4.13
asterisk asterisk 1.4.14
asterisk asterisk 1.4.15
asterisk asterisk 1.4.16
asterisk asterisk 1.4.16.1
asterisk asterisk 1.4.16.2
asterisk asterisk 1.4.17
asterisk asterisk 1.4.18
asterisk asterisk 1.4.18.1
asterisk asterisk 1.4.19
asterisk asterisk 1.4_beta
asterisk asterisk 1.4_revision_95946
asterisk asterisk 1.6
asterisk asterisk a
asterisk asterisk a
asterisk asterisk b.1.3.2
asterisk asterisk b.1.3.2
asterisk asterisk b.1.3.3
asterisk asterisk b.1.3.3
asterisk asterisk b.2.2.0
asterisk asterisk b.2.2.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF8EBD08-B640-42E7-BEDB-E7A279043AE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCEB7358-12E8-4E8C-987E-14493BED32BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A6460CC-1A31-4776-890A-FA3120A85C97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F9B2C53-C767-434C-8A16-356FE39DC3F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "81DF3AD9-E2B7-4D65-A7FB-587D97AF418A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7AC1ACB-A7A4-41C9-B85B-4FA48AA845C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "22521061-EFFB-4EC2-BA8F-D6D55E43CCB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "74257EDA-40C0-4762-8184-1526B5682326",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAF09DF6-3E23-4139-92A2-DC44D2A2CF89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "3003B53D-F21C-4D37-903D-D6F51EF6E63E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.1.9_1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF3E676F-0559-4135-8B01-27A808363F21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "93F75E29-3952-4E28-A17C-2EC87203F4F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B67F4F2-CDB9-46C1-AE4C-3E183E54693A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "D61CF0C0-5118-4CBC-BD78-BCF55569C167",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B4D46FC-06D3-4022-B971-0BA11868486B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C3C518-8427-40F1-832C-31D414DB9A80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "77038CD8-F21A-4372-8D23-1A2563865334",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E29B048-41E8-4301-8863-BE73C4AEE178",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B60E0BAB-6D6E-48DB-92A9-62769E25C024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB40890B-5C7C-4BDD-8579-80C75C259570",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "323CDA8E-FBB4-455F-BC72-A3588FE0014B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "09BDB6F9-A258-4537-BEFB-BB18A38B1071",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "54F50B72-EFB3-448F-A2B8-C2BE4D4BF341",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0973E099-B757-4845-9A4C-E2DAD3C3336C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "02A94415-B792-4CA4-A271-F04D6B8A793E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "358D057C-1C78-43C6-9DB8-3CC8FF2AAEA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E76012FA-1BD9-4A0D-830A-88B5A319C794",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "79244AE5-FD84-42B5-A56B-18293B999423",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF25D879-9A00-48D2-93F8-BE692DE76E38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "69BE50A7-FCA8-470A-B212-A516224306EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E306F943-ECA2-41C8-8C5D-F6A3D68ECE79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C309D90-24ED-4DC7-A770-783A7E28705F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B6DFD0D-86CE-4423-A0F4-C3581F916038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "77255177-4EB2-47F5-8B3A-F6164C3C8173",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2145ECD7-D734-4D58-8474-2F38DF9DB94F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BC2FFDF-1E94-4E1F-BABC-8B53D8B986F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "38C3AAB7-EA93-40BA-8ADE-380DA3520747",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E97310AF-E163-4C4F-A0BE-2940A67C336B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta2:*:*:*:*:*:*:*",
              "matchCriteriaId": "66A7A018-4EB6-4C15-9A22-E4299A6919C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "16B00825-6346-4A1E-A04C-714A8EDB043A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC3E1877-27E0-4DB1-BFB1-E70043125724",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E55B3B9A-4D40-470F-ABBD-1D9105EB01F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BD1092A-B278-4606-A328-3BC38CF535CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7A7F90E-4600-4058-BB10-E39BE8F4968F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5722AD0B-B329-4DA3-A251-A18DD6EE505E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B8E66C-B2EB-4F1F-9226-07A957885D8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9A87BEC-8F36-48CB-83CA-7E69B16629E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECD3CBC1-1371-440A-9EA1-7495A4FA2C49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B4841AD-96B7-4518-AC3E-3D23C88C083B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B89DF1E-8BF7-4907-83BF-B4A1DFFEBC92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C89A173C-C64A-440F-BCC6-EDE692521171",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C716CAB8-5F2D-44DA-982B-3A47B3B59A1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0FABB45-93A9-49BB-93DA-D13305E2FF84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F82331-A7C1-4166-AE45-A83BD7FC3D25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "26A10E99-3A8C-430A-8FB6-4A55E01A00E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5DF84B2-A104-4FA2-8B02-D243D76ACEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4BA2270-DF93-48FB-A90F-DFBFED05F051",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4FE0264-95E4-4B75-8904-369035DEA2F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "A39F4E4E-B3B0-47AE-A36D-823E74C0FCCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7381C3C-50A0-41FB-804C-C0D57B7173C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D6D1FA9-D83A-4399-86DB-F844F24771B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2EAE6FD-5A1A-4596-9E01-B6AE9C8ABE70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "69B207B9-A4F4-4A3A-B6AD-C3470A7FA226",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "65C8D404-EF04-440E-A134-5A94AEB30DD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "A10E0435-D6A4-405A-A855-F755F1A850A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "218B3095-4CC2-4CC3-9ED6-98293DC27FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AB9EE91-2388-4FAF-B79F-04025879EFB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.26.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EA10487-E9DC-4017-BCDF-7D1CC3C84C99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.26.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9FD0788-C8E7-406B-9CA2-72341F71771E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "A678E060-6274-40B6-94BD-84C598689694",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B0F95F5-AFA0-4F75-904F-E9B501FA1FBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.28.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A3722B7-722B-4EE2-BE30-A00B530768F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "49641F43-FB6C-422A-9482-59B242BAA889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "9ED92AF3-3C13-4206-BC76-E6B9368C599A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "593AA737-5AF3-4F7C-B74B-D3F37701C435",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D942B911-979A-4AC3-93D6-07E420171E77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "84CB8C4A-F001-4DD7-8DFE-CB082B4BB969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "96DB0240-E93D-4BDB-859B-B44C91996993",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.4_2007-04-27:*:*:*:*:*:*:*",
              "matchCriteriaId": "465DB1C7-D5DD-4A2D-8506-8642AB8363C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F4BA849-E092-404A-92CD-44C2D99AE971",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C7014B4-1860-49AD-9469-9954C3CC01C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D1F0056-0945-476C-982E-7B41EB420A99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A53DEC9D-B288-42CD-9387-57315AC98D72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "89C1F33F-27B6-4C56-92FF-EB2861ABBC22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E07CF3-073D-4705-96A6-13367D4F5CAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "18D19CB0-E3D7-40DB-B0C0-B62BB6075267",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "77FB7CC1-BD0D-4F34-AB21-59CFD23C494C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "997FA3C7-1894-478A-ABF1-52DD2B0487E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "96E02BE0-BF4A-46C9-AFB5-47E8F18E3D17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "292190EE-D9C8-4E3A-BB34-0ECD7B865482",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DAC55F9-1D43-4AA8-87C9-DB165442700B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.16.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "219760EE-AA86-4423-890D-1BD5D9D3ACEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.16.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "613B69C5-4330-46E0-B6DF-322C5BC6D5A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "195B012E-0538-4140-9035-F5D1A442778B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA65023F-965D-4FA3-A1AB-DB4A7E9D05A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.18.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "78AC03A7-41AB-45AF-AD89-291A7429B8A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9FE3CC7-74FB-4401-A0D3-924D6A45EB74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "181C8E98-2138-4BFC-B6B0-1DA270AEE7F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4_revision_95946:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB08F4FA-8600-4D21-A565-B3BF636634B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEAE6729-D79A-49B8-9758-BA74A60A238A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E5B291D-25D6-4629-954C-99722F8B9918",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:a:*:business:*:*:*:*:*",
              "matchCriteriaId": "C6702046-43CF-4C84-9F76-24716C9F7D20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "27DA769B-8D20-47EC-95A1-F616243A7BA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.2:*:business:*:*:*:*:*",
              "matchCriteriaId": "524CF00B-1B36-4C1F-80B4-28349891669B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3736EFBD-357A-4E9A-8865-7F27FA7052E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.3:*:business:*:*:*:*:*",
              "matchCriteriaId": "2942FA48-42CE-4E67-A5BF-7852652EDE28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "05515185-52F6-4A69-A32C-BC2F89E4CFFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.2.0:*:business:*:*:*:*:*",
              "matchCriteriaId": "4160A834-9194-474C-819B-60627E470D13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The IAX2 protocol implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (call-number exhaustion and CPU consumption) by quickly sending a large number of IAX2 (IAX) POKE requests."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n del protocolo IAX2 en Asterisk Open Source versiones 1.0.x, versiones 1.2.x anteriores a 1.2.30 y versiones 1.4.x anteriores a 1.4.21.2; Business Edition versiones A.x.x, versiones B.x.x anteriores a B.2.5.4 y versiones C.x.x anteriores a C.1.10.3; AsteriskNOW; Appliance Developer Kit versiones 0.x.x; y s800i versiones 1.0.x anteriores a 1.2.0.1, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (agotamiento del n\u00famero de llamadas y consumo de CPU) mediante el env\u00edo r\u00e1pido de un gran n\u00famero de peticiones POKE de IAX2 (IAX)."
    }
  ],
  "id": "CVE-2008-3263",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-07-22T23:41:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://downloads.digium.com/pub/security/AST-2008-010.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://downloads.securityfocus.com/vulnerabilities/exploits/30321.pl"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/31178"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/31194"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/34982"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200905-01.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/494675/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/30321"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1020535"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/2168/references"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43942"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://downloads.digium.com/pub/security/AST-2008-010.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://downloads.securityfocus.com/vulnerabilities/exploits/30321.pl"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31178"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31194"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/34982"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200905-01.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/494675/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/30321"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1020535"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/2168/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43942"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-07-18 17:30
Modified
2025-04-09 00:30
Severity ?
Summary
The IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted (1) LAGRQ or (2) LAGRP frame that contains information elements of IAX frames, which results in a NULL pointer dereference when Asterisk does not properly set an associated variable.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "54F50B72-EFB3-448F-A2B8-C2BE4D4BF341",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "69BE50A7-FCA8-470A-B212-A516224306EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E306F943-ECA2-41C8-8C5D-F6A3D68ECE79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C309D90-24ED-4DC7-A770-783A7E28705F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B6DFD0D-86CE-4423-A0F4-C3581F916038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "77255177-4EB2-47F5-8B3A-F6164C3C8173",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2145ECD7-D734-4D58-8474-2F38DF9DB94F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "38C3AAB7-EA93-40BA-8ADE-380DA3520747",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E97310AF-E163-4C4F-A0BE-2940A67C336B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta2:*:*:*:*:*:*:*",
              "matchCriteriaId": "66A7A018-4EB6-4C15-9A22-E4299A6919C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7A7F90E-4600-4058-BB10-E39BE8F4968F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5722AD0B-B329-4DA3-A251-A18DD6EE505E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B8E66C-B2EB-4F1F-9226-07A957885D8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECD3CBC1-1371-440A-9EA1-7495A4FA2C49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B4841AD-96B7-4518-AC3E-3D23C88C083B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C89A173C-C64A-440F-BCC6-EDE692521171",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C716CAB8-5F2D-44DA-982B-3A47B3B59A1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0FABB45-93A9-49BB-93DA-D13305E2FF84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F82331-A7C1-4166-AE45-A83BD7FC3D25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "26A10E99-3A8C-430A-8FB6-4A55E01A00E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5DF84B2-A104-4FA2-8B02-D243D76ACEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4BA2270-DF93-48FB-A90F-DFBFED05F051",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4FE0264-95E4-4B75-8904-369035DEA2F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "593AA737-5AF3-4F7C-B74B-D3F37701C435",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D942B911-979A-4AC3-93D6-07E420171E77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.4_2007-04-27:*:*:*:*:*:*:*",
              "matchCriteriaId": "465DB1C7-D5DD-4A2D-8506-8642AB8363C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "181C8E98-2138-4BFC-B6B0-1DA270AEE7F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:a:*:business:*:*:*:*:*",
              "matchCriteriaId": "C6702046-43CF-4C84-9F76-24716C9F7D20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.2:*:business:*:*:*:*:*",
              "matchCriteriaId": "524CF00B-1B36-4C1F-80B4-28349891669B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.3:*:business:*:*:*:*:*",
              "matchCriteriaId": "2942FA48-42CE-4E67-A5BF-7852652EDE28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.2.0:*:business:*:*:*:*:*",
              "matchCriteriaId": "4160A834-9194-474C-819B-60627E470D13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C150564-406F-4B49-AEF8-0F2887738E4D",
              "versionEndIncluding": "0.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B12A09BE-1EE0-46D5-B3F0-E8847409A49A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A5A734E-1DD3-4924-8AC1-97048FA3270F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9282AC42-E98A-4BC2-B46D-15B5776C961F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "83DBFD69-2500-46C1-827C-1493CF896F49",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted (1) LAGRQ or (2) LAGRP frame that contains information elements of IAX frames, which results in a NULL pointer dereference when Asterisk does not properly set an associated variable."
    },
    {
      "lang": "es",
      "value": "El gestor de dispositivo de canal IAX2 (chan_iax2) en Asterisk versiones anteriores a 1.2.22 y 1.4.x versiones anteriores a 1.4.8, Business Edition versiones anteriores a B.2.2.1, AsteriskNOW versiones anteriores a beta7, Appliance Developer Kit versiones anteriores a 0.5.0, y s800i versiones anteriores a 1.0.2 permite a atacantes remotos   provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante tramas (1) LAGRQ \u00f3 (2) LAGRP que contienen elementos de informaci\u00f3n de tramas IAX, que resulta en una referencia a puntero NULL cuando Asterisk no asigna apropiadamente una variable asociado."
    }
  ],
  "id": "CVE-2007-3763",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-07-18T17:30:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://ftp.digium.com/pub/asa/ASA-2007-015.pdf"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26099"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29051"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2007/dsa-1358"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/24950"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1018407"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/2563"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://ftp.digium.com/pub/asa/ASA-2007-015.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26099"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29051"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1358"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/24950"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1018407"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2563"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-07-18 17:30
Modified
2025-04-09 00:30
Severity ?
Summary
The STUN implementation in Asterisk 1.4.x before 1.4.8, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted STUN length attribute in a STUN packet sent on an RTP port.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "54F50B72-EFB3-448F-A2B8-C2BE4D4BF341",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "69BE50A7-FCA8-470A-B212-A516224306EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E306F943-ECA2-41C8-8C5D-F6A3D68ECE79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C309D90-24ED-4DC7-A770-783A7E28705F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B6DFD0D-86CE-4423-A0F4-C3581F916038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "77255177-4EB2-47F5-8B3A-F6164C3C8173",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2145ECD7-D734-4D58-8474-2F38DF9DB94F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "38C3AAB7-EA93-40BA-8ADE-380DA3520747",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E97310AF-E163-4C4F-A0BE-2940A67C336B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta2:*:*:*:*:*:*:*",
              "matchCriteriaId": "66A7A018-4EB6-4C15-9A22-E4299A6919C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7A7F90E-4600-4058-BB10-E39BE8F4968F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5722AD0B-B329-4DA3-A251-A18DD6EE505E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B8E66C-B2EB-4F1F-9226-07A957885D8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECD3CBC1-1371-440A-9EA1-7495A4FA2C49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B4841AD-96B7-4518-AC3E-3D23C88C083B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C89A173C-C64A-440F-BCC6-EDE692521171",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C716CAB8-5F2D-44DA-982B-3A47B3B59A1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0FABB45-93A9-49BB-93DA-D13305E2FF84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F82331-A7C1-4166-AE45-A83BD7FC3D25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "26A10E99-3A8C-430A-8FB6-4A55E01A00E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5DF84B2-A104-4FA2-8B02-D243D76ACEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4BA2270-DF93-48FB-A90F-DFBFED05F051",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4FE0264-95E4-4B75-8904-369035DEA2F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "593AA737-5AF3-4F7C-B74B-D3F37701C435",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D942B911-979A-4AC3-93D6-07E420171E77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.4_2007-04-27:*:*:*:*:*:*:*",
              "matchCriteriaId": "465DB1C7-D5DD-4A2D-8506-8642AB8363C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "181C8E98-2138-4BFC-B6B0-1DA270AEE7F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:a:*:business:*:*:*:*:*",
              "matchCriteriaId": "C6702046-43CF-4C84-9F76-24716C9F7D20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.2:*:business:*:*:*:*:*",
              "matchCriteriaId": "524CF00B-1B36-4C1F-80B4-28349891669B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.3:*:business:*:*:*:*:*",
              "matchCriteriaId": "2942FA48-42CE-4E67-A5BF-7852652EDE28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.2.0:*:business:*:*:*:*:*",
              "matchCriteriaId": "4160A834-9194-474C-819B-60627E470D13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C150564-406F-4B49-AEF8-0F2887738E4D",
              "versionEndIncluding": "0.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B12A09BE-1EE0-46D5-B3F0-E8847409A49A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A5A734E-1DD3-4924-8AC1-97048FA3270F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9282AC42-E98A-4BC2-B46D-15B5776C961F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "83DBFD69-2500-46C1-827C-1493CF896F49",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The STUN implementation in Asterisk 1.4.x before 1.4.8, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted STUN length attribute in a STUN packet sent on an RTP port."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n STUN en Asterisk 1.4.x anterior a 1.4.8, AsteriskNOW anterior a beta7, Appliance Developer Kit anterior a 0.5.0, y s800i anterior a 1.0.2 permite a atacantes remotos provocar denegaci\u00f3n de servicio (caida) a trav\u00e9s de una longitud de atributo manipulado STUN en un paquete STUN enviado a un puerto RTP."
    }
  ],
  "id": "CVE-2007-3765",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-07-18T17:30:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://ftp.digium.com/pub/asa/ASA-2007-017.pdf"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26099"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/24950"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1018407"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/2563"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35480"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://ftp.digium.com/pub/asa/ASA-2007-017.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26099"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/24950"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1018407"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2563"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35480"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-04-26 20:19
Modified
2025-04-09 00:30
Severity ?
Summary
The SIP channel driver (chan_sip) in Asterisk before 1.2.18 and 1.4.x before 1.4.3 does not properly parse SIP UDP packets that do not contain a valid response code, which allows remote attackers to cause a denial of service (crash).
Impacted products
Vendor Product Version
asterisk asterisk 1.2.0_beta1
asterisk asterisk 1.2.0_beta2
asterisk asterisk 1.2.10
asterisk asterisk 1.2.11
asterisk asterisk 1.2.12
asterisk asterisk 1.2.13
asterisk asterisk 1.2.14
asterisk asterisk 1.2.15
asterisk asterisk 1.2.16
asterisk asterisk 1.2.17
asterisk asterisk 1.4.1
asterisk asterisk 1.4.2
asterisk asterisk 1.4_beta



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E97310AF-E163-4C4F-A0BE-2940A67C336B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta2:*:*:*:*:*:*:*",
              "matchCriteriaId": "66A7A018-4EB6-4C15-9A22-E4299A6919C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C89A173C-C64A-440F-BCC6-EDE692521171",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C716CAB8-5F2D-44DA-982B-3A47B3B59A1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0FABB45-93A9-49BB-93DA-D13305E2FF84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F82331-A7C1-4166-AE45-A83BD7FC3D25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "26A10E99-3A8C-430A-8FB6-4A55E01A00E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5DF84B2-A104-4FA2-8B02-D243D76ACEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4BA2270-DF93-48FB-A90F-DFBFED05F051",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4FE0264-95E4-4B75-8904-369035DEA2F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "593AA737-5AF3-4F7C-B74B-D3F37701C435",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D942B911-979A-4AC3-93D6-07E420171E77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "181C8E98-2138-4BFC-B6B0-1DA270AEE7F6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SIP channel driver (chan_sip) in Asterisk before 1.2.18 and 1.4.x before 1.4.3 does not properly parse SIP UDP packets that do not contain a valid response code, which allows remote attackers to cause a denial of service (crash)."
    },
    {
      "lang": "es",
      "value": "El SIP channel driver (chan_sip) del Asterisk anterior al 1.2.18 y el 1.4.x anterior al 1.4.3 no analiza sint\u00e1cticamente de forma correcta los paquetes SIP UDP que no contienen un c\u00f3digo de respuesta v\u00e1lido, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda)."
    }
  ],
  "id": "CVE-2007-2297",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-04-26T20:19:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.digium.com/view.php?id=9313"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25582"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/2644"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.asterisk.org/files/ASA-2007-011.pdf"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2007/dsa-1358"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/466882/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/24359"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securitytracker.com/id?1017954"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33892"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.digium.com/view.php?id=9313"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25582"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/2644"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.asterisk.org/files/ASA-2007-011.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1358"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/466882/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/24359"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securitytracker.com/id?1017954"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33892"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-09-08 18:30
Modified
2025-04-09 00:30
Severity ?
Summary
The IAX2 protocol implementation in Asterisk Open Source 1.2.x before 1.2.35, 1.4.x before 1.4.26.2, 1.6.0.x before 1.6.0.15, and 1.6.1.x before 1.6.1.6; Business Edition B.x.x before B.2.5.10, C.2.x before C.2.4.3, and C.3.x before C.3.1.1; and s800i 1.3.x before 1.3.0.3 allows remote attackers to cause a denial of service (call-number exhaustion) by initiating many IAX2 message exchanges, a related issue to CVE-2008-3263.
Impacted products
Vendor Product Version
asterisk asterisk b.1.3.2
asterisk asterisk b.1.3.3
asterisk asterisk b.2.2.0
asterisk asterisk b.2.2.1
asterisk asterisk b.2.3.1
asterisk asterisk b.2.3.2
asterisk asterisk b.2.3.3
asterisk asterisk b.2.3.4
asterisk asterisk b.2.3.5
asterisk asterisk b.2.3.6
asterisk asterisk b.2.5.1
asterisk asterisk b.2.5.3
asterisk asterisk b.2.5.4
asterisk asterisk b.2.5.5
asterisk asterisk b.2.5.6
asterisk asterisk b.2.5.8
asterisk asterisk b.2.5.9
asterisk asterisk c.1.0_beta7
asterisk asterisk c.1.0_beta8
asterisk asterisk c.1.6
asterisk asterisk c.1.6.1
asterisk asterisk c.1.6.2
asterisk asterisk c.1.8.1
asterisk asterisk c.1.10.3
asterisk asterisk c.1.10.4
asterisk asterisk c.1.10.5
asterisk asterisk c.2.1.2.1
asterisk asterisk c.2.3
asterisk asterisk c.2.3.3
asterisk asterisk c.2.4.2
asterisk asterisk c.3.1.0
asterisk open_source 1.2.0
asterisk open_source 1.2.0
asterisk open_source 1.2.0
asterisk open_source 1.2.0
asterisk open_source 1.2.0
asterisk open_source 1.2.1
asterisk open_source 1.2.2
asterisk open_source 1.2.2
asterisk open_source 1.2.3
asterisk open_source 1.2.3
asterisk open_source 1.2.4
asterisk open_source 1.2.4
asterisk open_source 1.2.5
asterisk open_source 1.2.5
asterisk open_source 1.2.6
asterisk open_source 1.2.6
asterisk open_source 1.2.7
asterisk open_source 1.2.7
asterisk open_source 1.2.7.1
asterisk open_source 1.2.7.1
asterisk open_source 1.2.8
asterisk open_source 1.2.8
asterisk open_source 1.2.9
asterisk open_source 1.2.9.1
asterisk open_source 1.2.9.1
asterisk open_source 1.2.10
asterisk open_source 1.2.10
asterisk open_source 1.2.11
asterisk open_source 1.2.11
asterisk open_source 1.2.12
asterisk open_source 1.2.12
asterisk open_source 1.2.12.1
asterisk open_source 1.2.12.1
asterisk open_source 1.2.13
asterisk open_source 1.2.13
asterisk open_source 1.2.14
asterisk open_source 1.2.14
asterisk open_source 1.2.15
asterisk open_source 1.2.15
asterisk open_source 1.2.16
asterisk open_source 1.2.16
asterisk open_source 1.2.17
asterisk open_source 1.2.17
asterisk open_source 1.2.18
asterisk open_source 1.2.18
asterisk open_source 1.2.19
asterisk open_source 1.2.19
asterisk open_source 1.2.20
asterisk open_source 1.2.20
asterisk open_source 1.2.21
asterisk open_source 1.2.21
asterisk open_source 1.2.21.1
asterisk open_source 1.2.21.1
asterisk open_source 1.2.22
asterisk open_source 1.2.22
asterisk open_source 1.2.23
asterisk open_source 1.2.23
asterisk open_source 1.2.24
asterisk open_source 1.2.24
asterisk open_source 1.2.25
asterisk open_source 1.2.25
asterisk open_source 1.2.26
asterisk open_source 1.2.26
asterisk open_source 1.2.26.1
asterisk open_source 1.2.26.1
asterisk open_source 1.2.26.2
asterisk open_source 1.2.26.2
asterisk open_source 1.2.27
asterisk open_source 1.2.28
asterisk open_source 1.2.29
asterisk open_source 1.2.30
asterisk open_source 1.2.30.2
asterisk open_source 1.2.30.3
asterisk open_source 1.2.30.4
asterisk open_source 1.2.31
asterisk open_source 1.2.32
asterisk open_source 1.2.33
asterisk open_source 1.2.34
asterisk open_source 1.4.0
asterisk open_source 1.4.0
asterisk open_source 1.4.0
asterisk open_source 1.4.0
asterisk open_source 1.4.1
asterisk open_source 1.4.2
asterisk open_source 1.4.3
asterisk open_source 1.4.4
asterisk open_source 1.4.5
asterisk open_source 1.4.6
asterisk open_source 1.4.7
asterisk open_source 1.4.7.1
asterisk open_source 1.4.8
asterisk open_source 1.4.9
asterisk open_source 1.4.10
asterisk open_source 1.4.10.1
asterisk open_source 1.4.11
asterisk open_source 1.4.12
asterisk open_source 1.4.12.1
asterisk open_source 1.4.13
asterisk open_source 1.4.14
asterisk open_source 1.4.15
asterisk open_source 1.4.16
asterisk open_source 1.4.16.1
asterisk open_source 1.4.16.2
asterisk open_source 1.4.17
asterisk open_source 1.4.18
asterisk open_source 1.4.18.1
asterisk open_source 1.4.19
asterisk open_source 1.4.19
asterisk open_source 1.4.19
asterisk open_source 1.4.19
asterisk open_source 1.4.19
asterisk open_source 1.4.19
asterisk open_source 1.4.19.1
asterisk open_source 1.4.19.2
asterisk open_source 1.4.20
asterisk open_source 1.4.20
asterisk open_source 1.4.20
asterisk open_source 1.4.20
asterisk open_source 1.4.21
asterisk open_source 1.4.21
asterisk open_source 1.4.21
asterisk open_source 1.4.21.1
asterisk open_source 1.4.21.2
asterisk open_source 1.4.22
asterisk open_source 1.4.22
asterisk open_source 1.4.22
asterisk open_source 1.4.22.1
asterisk open_source 1.4.22.2
asterisk open_source 1.4.23
asterisk open_source 1.4.23
asterisk open_source 1.4.23
asterisk open_source 1.4.23
asterisk open_source 1.4beta
asterisk open_source 1.6.0
asterisk open_source 1.6.0
asterisk open_source 1.6.0
asterisk open_source 1.6.0
asterisk open_source 1.6.0
asterisk open_source 1.6.0
asterisk open_source 1.6.0
asterisk open_source 1.6.0
asterisk open_source 1.6.0
asterisk open_source 1.6.0
asterisk open_source 1.6.0
asterisk open_source 1.6.0
asterisk open_source 1.6.0.1
asterisk open_source 1.6.0.2
asterisk open_source 1.6.0.3
asterisk open_source 1.6.0.3
asterisk open_source 1.6.1.0
asterisk open_source 1.6.1.0
asterisk open_source 1.6.1.5
asterisk opensource 1.4.23.2
asterisk opensource 1.4.24
asterisk opensource 1.4.24.1
asterisk opensource 1.4.26
asterisk opensource 1.4.26.1
sangoma asterisk 1.6.1
sangoma asterisk 1.6.1.4
asterisk appliance_s800i 1.3
asterisk appliance_s800i 1.3.0.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.2:*:business:*:*:*:*:*",
              "matchCriteriaId": "524CF00B-1B36-4C1F-80B4-28349891669B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.3:*:business:*:*:*:*:*",
              "matchCriteriaId": "2942FA48-42CE-4E67-A5BF-7852652EDE28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.2.0:*:business:*:*:*:*:*",
              "matchCriteriaId": "4160A834-9194-474C-819B-60627E470D13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.2.1:*:business:*:*:*:*:*",
              "matchCriteriaId": "D81F6E55-80F1-4770-9FF0-305EEEF3C4E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.1:*:business:*:*:*:*:*",
              "matchCriteriaId": "087DC9EC-0DF2-48AE-BB62-8DDF95C3EC56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.2:*:business:*:*:*:*:*",
              "matchCriteriaId": "471032A5-5EB6-44D1-91C8-BEA42C1E205A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.3:*:business:*:*:*:*:*",
              "matchCriteriaId": "6FEB3FCA-065E-4C32-A4C7-F2C79F214F17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.4:*:business:*:*:*:*:*",
              "matchCriteriaId": "636D765F-C47B-4762-9419-D7B51FA38AEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.5:*:business:*:*:*:*:*",
              "matchCriteriaId": "36F29EE8-E05F-4F0A-B0FA-66C551856C3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.6:*:business:*:*:*:*:*",
              "matchCriteriaId": "CEAA72FE-E13C-4363-AF5C-7D1CEEE2FA77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.5.1:*:business:*:*:*:*:*",
              "matchCriteriaId": "3BAD5B3E-80FC-4B23-BD51-41D17BFA9C71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.5.3:*:business:*:*:*:*:*",
              "matchCriteriaId": "0B09EFBF-B8AD-455F-8F47-7C8F52371214",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.5.4:*:business:*:*:*:*:*",
              "matchCriteriaId": "4CF18A17-E16D-4529-9705-6E2333C89CE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.5.5:*:business:*:*:*:*:*",
              "matchCriteriaId": "1ED6AC46-E485-4D0A-BFC1-3DEED113B9B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.5.6:*:business:*:*:*:*:*",
              "matchCriteriaId": "25A4B8D6-373F-442B-978A-61E53EEA9870",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.5.8:*:business:*:*:*:*:*",
              "matchCriteriaId": "30D7485F-109D-46B9-8E6E-52E963080BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.5.9:*:business:*:*:*:*:*",
              "matchCriteriaId": "D5C22240-282C-4B10-8CAE-CC07E5784C3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:c.1.0_beta7:*:business:*:*:*:*:*",
              "matchCriteriaId": "D0A87D63-35F5-47D7-893B-E8B179B16C3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:c.1.0_beta8:*:business:*:*:*:*:*",
              "matchCriteriaId": "95C1809E-9031-483F-B873-160284FA71D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:c.1.6:*:business:*:*:*:*:*",
              "matchCriteriaId": "E35C336A-A786-476B-8B9F-E682D999B6AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:c.1.6.1:*:business:*:*:*:*:*",
              "matchCriteriaId": "8121721B-EBC6-44EA-86D6-7B0FF1C8FF52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:c.1.6.2:*:business:*:*:*:*:*",
              "matchCriteriaId": "1E76B3DD-5C38-4323-9F24-9327CC4E6FE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:c.1.8.1:*:business:*:*:*:*:*",
              "matchCriteriaId": "EB75A0FE-9D22-4DDB-909C-C87036328499",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:c.1.10.3:*:business:*:*:*:*:*",
              "matchCriteriaId": "75003D80-231D-4AC4-8346-4D4E4C8643E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:c.1.10.4:*:business:*:*:*:*:*",
              "matchCriteriaId": "A04E037D-7F3F-4387-818D-1D618885AAF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:c.1.10.5:*:business:*:*:*:*:*",
              "matchCriteriaId": "2CACA83A-4D1E-458D-BA30-3C138FB848E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:c.2.1.2.1:*:business:*:*:*:*:*",
              "matchCriteriaId": "32D447AB-DAF1-4F70-8686-156C0ACDAE4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:c.2.3:*:business:*:*:*:*:*",
              "matchCriteriaId": "6A958EDA-6FB8-447B-B190-8802C9DC9D3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:c.2.3.3:*:business:*:*:*:*:*",
              "matchCriteriaId": "30FDE355-2209-46D4-A4E9-4DF7B128014F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:c.2.4.2:*:business:*:*:*:*:*",
              "matchCriteriaId": "9CCDC56D-22F0-4617-A2FE-A23889F9C9AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:c.3.1.0:*:business:*:*:*:*:*",
              "matchCriteriaId": "E6B4EC4D-957C-4A93-B65C-10114845A226",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F7971E1-F136-4ADC-95EC-BC4F92E838CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "E62D108C-862D-4BDB-BE37-285AA4C9C59A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "CF1422F3-829D-498C-83A6-02989DFB70A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEB9D69-A404-4053-92F9-CAC3481AFF1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "E816CCDB-4169-4F09-AE87-E467F4BE7685",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "27202966-2C41-4964-9497-1887D2A834C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1471B5A2-15BE-4E7C-BA49-2E6002F7C8EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.2:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "65223182-1675-462C-AF67-4A48760A63F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7108D72F-5AFD-4EEF-B2A9-CA4FA792E193",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.3:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "DC7EB4CD-6436-4E0B-A620-9DF2AC8A3C66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "107DA2D8-FE7C-4B70-856D-43D58B988694",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.4:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "02D5E6DF-7C9C-479F-986B-D5C8A144ACB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD71DD9-8A15-45E2-9FB3-F0544D7E1B80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.5:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "68AF6200-1385-449F-A00E-2BACEE16450B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C14614F-4E27-40A6-9E56-2B1DBB10330B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.6:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "61C0769F-6739-41D2-ADD8-924AC04C5F28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A2F2F5A-66FD-4057-917C-66332A88D83E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "8EF13987-5767-4FED-9584-63D74B0A30A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "399B0206-B48B-46EF-8CA6-A6E5A2550B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7.1:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "C57C1324-E11A-4B2B-9722-A4A63AEF0497",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "26E9760F-C0EB-47BB-8DA4-CC7815099DAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.8:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "EE6D9718-D57D-48F6-A2B1-CECAFFCDDFB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C510A9A-C3E2-4AF8-9919-1A22E918CDEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BD915CD-A7D3-4305-A6C0-290C648A226C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.9.1:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "3249AB40-2058-42E9-9A33-64E434E5BB64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E79CCE5-C29B-4726-8D2F-BC20F70959BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.10:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "0CF6584D-A7BB-4BD5-8232-9293FEE4A971",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "F29C13DB-6F04-4B41-90A2-2408D70F3641",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.11:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "174D6B56-7D0F-46F0-849A-FD05CB348FAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F4F734E-0E78-4957-B323-8E9FBA7FF15C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.12:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "938F545A-F8A7-455E-8E5A-2B5454B6CE53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A4B117B-E945-4033-A79D-10DFAA3DF18B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.12.1:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "E7C0897A-C841-4AAB-A6B3-1FCF7A99A60A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA6D866F-8189-4FFD-AA24-47C0A015C246",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.13:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "B2BAA1B3-7DD3-4248-915D-2BCC0ACFA2C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4EBFB79-C269-4132-BFAB-451F66CE8289",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.14:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "21612C17-7368-4108-B55B-5AB5CA6733E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9E1028E-2C07-4BA3-B891-FA853A87B280",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.15:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "8A0D57D7-15AD-4CDF-A5A7-AB83F8E6154E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E74F577-70BD-4FAF-BCFD-10CD21FC5601",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.16:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "06DB25C8-4EA5-465F-8EFA-BCA8D40F1795",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "57BB03E2-E61C-4A94-82DF-8720698CE271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.17:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "A149F8C2-3DA5-44B2-A288-3482F3975824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B30A36F-5CE6-4246-8752-176FB5999C1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.18:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "9462B320-B69D-409D-8DCC-D8D6CA1A757D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0F76DFD-4DAC-4B02-8967-B242CDEEF6C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.19:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "ECCCBAE9-8FD4-43F0-9EF8-56E9BBA3D8C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A59BC20-3217-4584-9196-D1CD9E0D6B52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.20:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "BEA0014A-659B-4533-A393-6D4ADC80EB0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "56F728BA-FC9E-4EEE-9A08-C9C7433BD8D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "8F1621F9-7C84-4CF0-BBCD-CEAEE8683BAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C64DF29-5B3D-401E-885E-8E37FD577254",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21.1:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "346C9F65-B5FB-4A75-8E1B-137112F270D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A7BF52A-2FF8-40ED-B757-28A1101DE8F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.22:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "7EFEE380-0C64-4413-AF3A-45ABC8833500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A321C2D-852B-4498-ADD6-79956410AB94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.23:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "8CA18FC6-1480-400E-A885-8CDAE45AA7A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D5F0DCF-C6A2-4A09-90C9-D70F174FDEF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.24:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "93741261-378B-4C02-8D68-0E5F39128375",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C820538E-14EC-43C1-80DB-6AAE4905EF0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.25:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "07CF9DD6-B624-49F0-A8E4-7EBCE7932BEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9562112-2505-4F78-86DE-F30EFAEE47D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "9EEA1E9C-C1FB-4EFD-86EA-DCF78C57FC35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A6D8FD0-C8C1-4868-9AF1-96B1949C18AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.1:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "5E20FAF7-9031-478E-A89C-D6FB3B5FDE3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "72A840B4-216B-4063-997F-791FBC8C8658",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.2:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "72375576-F857-4585-A677-A326D89A65B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE47A547-26E7-48F9-B0A6-2F65E04A1EDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1AEB744-FCF2-4A41-8866-9D1D20E6C6B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "51E5EB34-30AD-4E81-8BD4-4AB905E52B82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "4359322B-08D0-4710-A9C3-54BD4A17B800",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.30.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "78F84DF4-DBA7-430C-AF17-F52024EF80D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.30.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "34266614-3588-485C-A609-37823F8499AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.30.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD299B8E-D912-4B67-85C3-79CFF4C4F3E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "9890504F-AA2E-44E9-8510-BFFD75FD6D29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "38CF30B7-832F-40D4-8DA2-47B55BAC78B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "2072ADDC-C105-49CD-929A-011C8B9C6CB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "A16BE0C5-4569-4F62-AC58-4B4D5B60D935",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "967DF432-DEF4-4FA2-8C8D-19A7FB663A33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "40850BF4-E252-4667-9B46-9B6FEF6E997D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "1BB01DD1-B29B-4210-88CC-9ADB3148A410",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "5C0FA6A3-BFA9-4397-B75B-75C8357C36B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "295D4042-2D3C-481B-B969-2DDAC1161198",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "99E9EE2A-56AD-42BC-8CB0-D34091849B0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "96877A3E-B54B-4F31-B281-76CDC98B2D02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D0B4503-42A6-4D88-954E-A662E91EC204",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4B73813-BCD8-429E-B9B9-D6665E026BC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BBA3ECC-4F40-41CD-A6D7-BBD680DDBACC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CBE2156-AF86-4C72-B33D-3FF83930F828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "61408884-FBBF-4D94-A552-F99AB46DCED6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A527277-D97D-4B74-906F-7481BDBD96D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8B57A32-7B83-4783-A244-C26301970444",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "044FD0D0-FC92-4A01-B0D4-11A703EF21FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3477EC1A-9634-492C-B052-35770A9C9F4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C90F104-FA2C-4091-B149-1774AC982C0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9328768-7C08-4143-B5F8-F5C2D735D21A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C04E2B3-094B-4828-A2FC-BB66244A9F73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BDE3D31-4BB2-45A3-B085-8C91152A3152",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE0107D4-395E-45F1-B963-7618CCC007D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "53B8E11B-4984-45A8-A107-D276205988B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "2495DB98-F923-4E60-86EC-2DBB7A98C90C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E186D125-996E-4900-A2B8-5CDC8B5D5136",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "27DC6CF7-4DF8-4472-A684-8CCB5E26FCFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "88576385-EF03-408B-9775-B52E6AFFE48A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A838577-2BA1-4792-8B69-6FB07FFD7727",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.18.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDEED3E1-13E0-46E6-8AAB-D24D2D04AE4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED2BF36F-CF10-4F24-970B-3D0BB7561C81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc-2:*:*:*:*:*:*",
              "matchCriteriaId": "D35DD57B-EF77-4C5F-9B44-DAF5E0560E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "BFC1BB05-15C6-4829-86EB-5B1BFA4B5B17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "AB77E88B-7233-4979-914E-24E671C1FB23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "C4FF0F09-0268-480F-A2F3-6F8C3F323EEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1CCF9CAE-674A-4833-9D5C-FCBD865BE9F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1593E1-BF21-4DB9-A18E-9F221F3F9022",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC8E9FE3-FA25-4054-876E-4A3CE6E71AFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BBAEADC-D1DE-46EF-808C-2F6D2A74D988",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.20:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "AEF8EB4B-2947-4BD3-ADF3-345AEFE85B05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.20:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "E4476FB3-A759-49F5-ABDE-6D2A321B61BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.20:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "DFC109C3-2F52-48BE-B07E-3D65F31C1012",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "E54101A9-3967-4111-8A03-DA1BB23141BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.21:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D8B00600-1D45-41F7-9A10-97FB39012FDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.21:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D8CB2331-0F95-45E0-AF5B-0B9C74C5BA88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.21.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4ADB6A7-76AC-4AE3-B1AA-9F8DFA635418",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.21.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "776BC35C-CF37-4F4E-9FD5-EC351D4C2C2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "F10DAABC-FF06-44FB-98EC-B6AD17C03FBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.22:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "ACA8AFD5-4C7C-4876-93CA-C5B3E881C455",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.22:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "547EEB2B-2ECA-4B00-83BB-CFAA11BE0145",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.22.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "83829E0F-C24B-4BD6-88EA-98898A9AD86E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.22.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4C19141-823E-4057-A699-FD1DFF92DF38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECE7FE41-E749-49B8-99DF-19F9E7C4827A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.23:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "4E78234B-39B6-4DB4-A10F-AA55F174D4F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.23:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3984CF42-2431-4661-B333-C6721DF7123A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.23:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "303CBFC2-22C1-47CE-A26C-A99B05763374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A8012CE-4D4B-4131-87E7-16D7907E3BB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "D4F88914-6097-4AF1-8337-DCF062EB88AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "8BDB49DC-5344-451E-B8D6-D02C3431CE78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "B1FDA8D3-5082-479B-BA0A-F1E83D750B5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "7305910F-42BA-44CE-A7AC-B6F74200B68D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "B93EB4D6-3375-44BC-870F-714A3BC00C2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "52F60D6E-64EB-4223-8A79-595693B444C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta7.1:*:*:*:*:*:*",
              "matchCriteriaId": "37CF29B9-4397-4298-9326-0443E666CDC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "7D85DA34-A977-4A82-8E79-7BFE064DE9EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta9:*:*:*:*:*:*",
              "matchCriteriaId": "1476EF7B-A6F8-4B10-AF0F-986EA6BA3116",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "98E222F0-4CAA-4247-A00D-C6CEC2E55198",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "63744245-6126-47F6-B9F5-E936538140C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "C8805BEE-A4CF-45C2-B948-F1E8EF0A0886",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E474C33-B42A-4BB8-AC57-8A9071316240",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B83B3132-7D78-4AC3-B83A-A6A20AA28993",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0147FCED-AE75-4945-B76E-33F2AA764B9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "9C976AB0-2D1A-40CA-AEC3-E271B59B6960",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.6.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "785205F3-88C1-4F63-B091-4920AF1C892D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.6.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "879A19B4-C037-407C-AC3F-76D6095E950C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.6.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF16907E-5B0A-4312-AB20-0020A6EDFDE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:opensource:1.4.23.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "876044E9-1B51-4877-A92F-63502D17E28F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:opensource:1.4.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBF0F165-E75F-4990-8369-5FD275E453AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:opensource:1.4.24.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A194CAD2-A056-4664-B24A-0424F69BA1E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:opensource:1.4.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "017F1C0D-0469-412A-99B0-70BF8195B148",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:opensource:1.4.26.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "23D0BE8E-1D28-4402-851E-C900E8609898",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sangoma:asterisk:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "15A0A1ED-5EDB-4D7B-9514-FD92BA00F940",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sangoma:asterisk:1.6.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "56DFDEB7-5220-4501-8499-9114727CD29A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:asterisk:appliance_s800i:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "27F70E5D-58B9-451D-96E9-CE788B5EEF9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:asterisk:appliance_s800i:1.3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B08893AA-F51D-44CA-97C1-8E7E5A7A7F54",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The IAX2 protocol implementation in Asterisk Open Source 1.2.x before 1.2.35, 1.4.x before 1.4.26.2, 1.6.0.x before 1.6.0.15, and 1.6.1.x before 1.6.1.6; Business Edition B.x.x before B.2.5.10, C.2.x before C.2.4.3, and C.3.x before C.3.1.1; and s800i 1.3.x before 1.3.0.3 allows remote attackers to cause a denial of service (call-number exhaustion) by initiating many IAX2 message exchanges, a related issue to CVE-2008-3263."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n del protocolo IAX2 en Asterisk Open Source v1.2.x antes de v1.2.35, v1.4.x antes de v1.4.26.2, v1.6.0.x antes de v1.6.0.15, v1.6.1.x antes de v1.6.1.x; Business Edition vB.x.x antes de que vB.2.5.10, vC.2.x antes vC.2.4.3 y vC.3.x antes de C.3.1.1; y S800i v1.3.x antes de v1.3.0.3 permite a atacantes remotos causar una denegaci\u00f3n de servicio iniciando muchos intercambios de mensajes IAX2. Se trata de una aunto relacionado con la CVE-2008-3263."
    }
  ],
  "id": "CVE-2009-2346",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-09-08T18:30:00.203",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://downloads.asterisk.org/pub/security/AST-2009-006.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36593"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1022819"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/506257/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/36275"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://downloads.asterisk.org/pub/security/AST-2009-006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36593"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1022819"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/506257/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/36275"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-04-26 20:19
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple stack-based buffer overflows in the process_sdp function in chan_sip.c of the SIP channel T.38 SDP parser in Asterisk before 1.4.3 allow remote attackers to execute arbitrary code via a long (1) T38FaxRateManagement or (2) T38FaxUdpEC SDP parameter in an SIP message, as demonstrated using SIP INVITE.
References
cve@mitre.orghttp://secunia.com/advisories/24977Patch, Vendor Advisory
cve@mitre.orghttp://securityreason.com/securityalert/2645
cve@mitre.orghttp://www.asterisk.org/files/ASA-2007-010.pdf
cve@mitre.orghttp://www.osvdb.org/35368
cve@mitre.orghttp://www.securityfocus.com/archive/1/466883/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/472804/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/23648Exploit, Patch
cve@mitre.orghttp://www.securitytracker.com/id?1017951Patch
cve@mitre.orghttp://www.securitytracker.com/id?1018337
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/1534
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/33895
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24977Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/2645
af854a3a-2127-422b-91ae-364da2661108http://www.asterisk.org/files/ASA-2007-010.pdf
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/35368
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/466883/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/472804/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/23648Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1017951Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1018337
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/1534
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/33895
Impacted products
Vendor Product Version
asterisk asterisk 1.4.1
asterisk asterisk 1.4.2
asterisk asterisk 1.4_beta



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "593AA737-5AF3-4F7C-B74B-D3F37701C435",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D942B911-979A-4AC3-93D6-07E420171E77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "181C8E98-2138-4BFC-B6B0-1DA270AEE7F6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple stack-based buffer overflows in the process_sdp function in chan_sip.c of the SIP channel T.38 SDP parser in Asterisk before 1.4.3 allow remote attackers to execute arbitrary code via a long (1) T38FaxRateManagement or (2) T38FaxUdpEC SDP parameter in an SIP message, as demonstrated using SIP INVITE."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos de b\u00fafer basados en pila en la funci\u00f3n process_sdp del chan_sip.c en el en el analizador sint\u00e1ctico SIP channel T.38 del Asterisk, anterior al 1.4.3. permiten a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante un par\u00e1metro largo (1) T38FaxRateManagement o (2) T38FaxUdpEC SDP en el mensaje SIP, como lo demostrado usando SIP INVITE."
    }
  ],
  "id": "CVE-2007-2293",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.6,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-04-26T20:19:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24977"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/2645"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.asterisk.org/files/ASA-2007-010.pdf"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/35368"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/466883/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/472804/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/23648"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securitytracker.com/id?1017951"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1018337"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/1534"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33895"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24977"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/2645"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.asterisk.org/files/ASA-2007-010.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/35368"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/466883/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/472804/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/23648"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securitytracker.com/id?1017951"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1018337"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/1534"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33895"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-03-22 23:19
Modified
2025-04-09 00:30
Severity ?
Summary
The handle_response function in chan_sip.c in Asterisk before 1.2.17 and 1.4.x before 1.4.2 allows remote attackers to cause a denial of service (crash) via a SIP Response code 0 in a SIP packet.
References
cve@mitre.orghttp://bugs.digium.com/view.php?id=9313Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/24579Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/24719
cve@mitre.orghttp://secunia.com/advisories/25582
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200704-01.xml
cve@mitre.orghttp://svn.digium.com/view/asterisk/trunk/channels/chan_sip.c?r1=58907&r2=59038
cve@mitre.orghttp://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.htmlVendor Advisory
cve@mitre.orghttp://www.asterisk.org/node/48338
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_34_asterisk.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/463434/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/23093
cve@mitre.orghttp://www.securitytracker.com/id?1017809
cve@mitre.orghttp://www.sineapps.com/news.php?rssid=1707Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/1077
af854a3a-2127-422b-91ae-364da2661108http://bugs.digium.com/view.php?id=9313Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24579Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24719
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25582
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200704-01.xml
af854a3a-2127-422b-91ae-364da2661108http://svn.digium.com/view/asterisk/trunk/channels/chan_sip.c?r1=58907&r2=59038
af854a3a-2127-422b-91ae-364da2661108http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.asterisk.org/node/48338
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_34_asterisk.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/463434/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/23093
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1017809
af854a3a-2127-422b-91ae-364da2661108http://www.sineapps.com/news.php?rssid=1707Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/1077



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "74257EDA-40C0-4762-8184-1526B5682326",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAF09DF6-3E23-4139-92A2-DC44D2A2CF89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "3003B53D-F21C-4D37-903D-D6F51EF6E63E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.1.9_1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF3E676F-0559-4135-8B01-27A808363F21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B67F4F2-CDB9-46C1-AE4C-3E183E54693A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B4D46FC-06D3-4022-B971-0BA11868486B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C3C518-8427-40F1-832C-31D414DB9A80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "77038CD8-F21A-4372-8D23-1A2563865334",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B60E0BAB-6D6E-48DB-92A9-62769E25C024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB40890B-5C7C-4BDD-8579-80C75C259570",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "323CDA8E-FBB4-455F-BC72-A3588FE0014B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:0.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "09BDB6F9-A258-4537-BEFB-BB18A38B1071",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "54F50B72-EFB3-448F-A2B8-C2BE4D4BF341",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "69BE50A7-FCA8-470A-B212-A516224306EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E306F943-ECA2-41C8-8C5D-F6A3D68ECE79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C309D90-24ED-4DC7-A770-783A7E28705F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B6DFD0D-86CE-4423-A0F4-C3581F916038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "77255177-4EB2-47F5-8B3A-F6164C3C8173",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2145ECD7-D734-4D58-8474-2F38DF9DB94F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "38C3AAB7-EA93-40BA-8ADE-380DA3520747",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E97310AF-E163-4C4F-A0BE-2940A67C336B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta2:*:*:*:*:*:*:*",
              "matchCriteriaId": "66A7A018-4EB6-4C15-9A22-E4299A6919C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7A7F90E-4600-4058-BB10-E39BE8F4968F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5722AD0B-B329-4DA3-A251-A18DD6EE505E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B8E66C-B2EB-4F1F-9226-07A957885D8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECD3CBC1-1371-440A-9EA1-7495A4FA2C49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B4841AD-96B7-4518-AC3E-3D23C88C083B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C89A173C-C64A-440F-BCC6-EDE692521171",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C716CAB8-5F2D-44DA-982B-3A47B3B59A1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0FABB45-93A9-49BB-93DA-D13305E2FF84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F82331-A7C1-4166-AE45-A83BD7FC3D25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "26A10E99-3A8C-430A-8FB6-4A55E01A00E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5DF84B2-A104-4FA2-8B02-D243D76ACEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4BA2270-DF93-48FB-A90F-DFBFED05F051",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4FE0264-95E4-4B75-8904-369035DEA2F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "593AA737-5AF3-4F7C-B74B-D3F37701C435",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "181C8E98-2138-4BFC-B6B0-1DA270AEE7F6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The handle_response function in chan_sip.c in Asterisk before 1.2.17 and 1.4.x before 1.4.2 allows remote attackers to cause a denial of service (crash) via a SIP Response code 0 in a SIP packet."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n handle_response en chan_sip.c de Asterisk before 1.2.17 y 1.4.x versiones anteriores a 1.4.2 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante una respuesta SIP c\u00f3digo 0 en un paquete SIP."
    }
  ],
  "id": "CVE-2007-1594",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-03-22T23:19:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://bugs.digium.com/view.php?id=9313"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24579"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/24719"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25582"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200704-01.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://svn.digium.com/view/asterisk/trunk/channels/chan_sip.c?r1=58907\u0026r2=59038"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.asterisk.org/node/48338"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/463434/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/23093"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1017809"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.sineapps.com/news.php?rssid=1707"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/1077"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://bugs.digium.com/view.php?id=9313"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24579"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24719"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25582"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200704-01.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://svn.digium.com/view/asterisk/trunk/channels/chan_sip.c?r1=58907\u0026r2=59038"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.asterisk.org/node/48338"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/463434/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/23093"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1017809"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.sineapps.com/news.php?rssid=1707"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/1077"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-07-18 17:30
Modified
2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in the IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to execute arbitrary code by sending a long (1) voice or (2) video RTP frame.
References
cve@mitre.orghttp://bugs.gentoo.org/show_bug.cgi?id=185713
cve@mitre.orghttp://ftp.digium.com/pub/asa/ASA-2007-014.pdfPatch
cve@mitre.orghttp://secunia.com/advisories/26099
cve@mitre.orghttp://secunia.com/advisories/29051
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200802-11.xml
cve@mitre.orghttp://www.debian.org/security/2007/dsa-1358
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_15_sr.html
cve@mitre.orghttp://www.securityfocus.com/bid/24949
cve@mitre.orghttp://www.securitytracker.com/id?1018407
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/2563
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/35466
af854a3a-2127-422b-91ae-364da2661108http://bugs.gentoo.org/show_bug.cgi?id=185713
af854a3a-2127-422b-91ae-364da2661108http://ftp.digium.com/pub/asa/ASA-2007-014.pdfPatch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26099
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29051
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200802-11.xml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1358
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_15_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/24949
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1018407
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2563
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/35466



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "54F50B72-EFB3-448F-A2B8-C2BE4D4BF341",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "69BE50A7-FCA8-470A-B212-A516224306EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E306F943-ECA2-41C8-8C5D-F6A3D68ECE79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C309D90-24ED-4DC7-A770-783A7E28705F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B6DFD0D-86CE-4423-A0F4-C3581F916038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "77255177-4EB2-47F5-8B3A-F6164C3C8173",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2145ECD7-D734-4D58-8474-2F38DF9DB94F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "38C3AAB7-EA93-40BA-8ADE-380DA3520747",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E97310AF-E163-4C4F-A0BE-2940A67C336B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta2:*:*:*:*:*:*:*",
              "matchCriteriaId": "66A7A018-4EB6-4C15-9A22-E4299A6919C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7A7F90E-4600-4058-BB10-E39BE8F4968F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5722AD0B-B329-4DA3-A251-A18DD6EE505E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B8E66C-B2EB-4F1F-9226-07A957885D8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECD3CBC1-1371-440A-9EA1-7495A4FA2C49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B4841AD-96B7-4518-AC3E-3D23C88C083B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C89A173C-C64A-440F-BCC6-EDE692521171",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C716CAB8-5F2D-44DA-982B-3A47B3B59A1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0FABB45-93A9-49BB-93DA-D13305E2FF84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F82331-A7C1-4166-AE45-A83BD7FC3D25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "26A10E99-3A8C-430A-8FB6-4A55E01A00E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5DF84B2-A104-4FA2-8B02-D243D76ACEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4BA2270-DF93-48FB-A90F-DFBFED05F051",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4FE0264-95E4-4B75-8904-369035DEA2F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "593AA737-5AF3-4F7C-B74B-D3F37701C435",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D942B911-979A-4AC3-93D6-07E420171E77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.4_2007-04-27:*:*:*:*:*:*:*",
              "matchCriteriaId": "465DB1C7-D5DD-4A2D-8506-8642AB8363C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "181C8E98-2138-4BFC-B6B0-1DA270AEE7F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:a:*:business:*:*:*:*:*",
              "matchCriteriaId": "C6702046-43CF-4C84-9F76-24716C9F7D20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.2:*:business:*:*:*:*:*",
              "matchCriteriaId": "524CF00B-1B36-4C1F-80B4-28349891669B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.3:*:business:*:*:*:*:*",
              "matchCriteriaId": "2942FA48-42CE-4E67-A5BF-7852652EDE28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.2.0:*:business:*:*:*:*:*",
              "matchCriteriaId": "4160A834-9194-474C-819B-60627E470D13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C150564-406F-4B49-AEF8-0F2887738E4D",
              "versionEndIncluding": "0.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B12A09BE-1EE0-46D5-B3F0-E8847409A49A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A5A734E-1DD3-4924-8AC1-97048FA3270F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9282AC42-E98A-4BC2-B46D-15B5776C961F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "83DBFD69-2500-46C1-827C-1493CF896F49",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to execute arbitrary code by sending a long (1) voice or (2) video RTP frame."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en el controlador de canal IAX2 (chan_iax2) de Asterisk anterior a 1.2.22 y 1.4.x anterior a 1.4.8, Business Edition anterior a B.2.2.1, AsteriskNOW anterior a beta7, Appliance Developer Kit anterior a 0.5.0, y s800i anterior a 1.0.2 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n enviando una trama RTP larga de (1) voz o (2) v\u00eddeo."
    }
  ],
  "id": "CVE-2007-3762",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-07-18T17:30:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://ftp.digium.com/pub/asa/ASA-2007-014.pdf"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26099"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29051"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2007/dsa-1358"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/24949"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1018407"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/2563"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35466"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://ftp.digium.com/pub/asa/ASA-2007-014.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26099"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29051"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1358"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/24949"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1018407"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2563"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35466"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-03-24 17:44
Modified
2025-04-09 00:30
Severity ?
Summary
The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses.
References
cve@mitre.orghttp://downloads.digium.com/pub/security/AST-2008-005.html
cve@mitre.orghttp://secunia.com/advisories/29449Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/29470
cve@mitre.orghttp://securityreason.com/securityalert/3764
cve@mitre.orghttp://www.securityfocus.com/archive/1/489819/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/28316
cve@mitre.orghttp://www.securitytracker.com/id?1019679
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/41304
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html
af854a3a-2127-422b-91ae-364da2661108http://downloads.digium.com/pub/security/AST-2008-005.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29449Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29470
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/3764
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/489819/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28316
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1019679
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/41304
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "593AA737-5AF3-4F7C-B74B-D3F37701C435",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D942B911-979A-4AC3-93D6-07E420171E77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "84CB8C4A-F001-4DD7-8DFE-CB082B4BB969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "96DB0240-E93D-4BDB-859B-B44C91996993",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F4BA849-E092-404A-92CD-44C2D99AE971",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C7014B4-1860-49AD-9469-9954C3CC01C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D1F0056-0945-476C-982E-7B41EB420A99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A53DEC9D-B288-42CD-9387-57315AC98D72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "89C1F33F-27B6-4C56-92FF-EB2861ABBC22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E07CF3-073D-4705-96A6-13367D4F5CAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "18D19CB0-E3D7-40DB-B0C0-B62BB6075267",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "77FB7CC1-BD0D-4F34-AB21-59CFD23C494C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "997FA3C7-1894-478A-ABF1-52DD2B0487E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "96E02BE0-BF4A-46C9-AFB5-47E8F18E3D17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "292190EE-D9C8-4E3A-BB34-0ECD7B865482",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DAC55F9-1D43-4AA8-87C9-DB165442700B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "195B012E-0538-4140-9035-F5D1A442778B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.18.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "78AC03A7-41AB-45AF-AD89-291A7429B8A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "181C8E98-2138-4BFC-B6B0-1DA270AEE7F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4_revision_95946:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB08F4FA-8600-4D21-A565-B3BF636634B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEAE6729-D79A-49B8-9758-BA74A60A238A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C05B437-C292-4AA0-8AFE-1CA07CD80034",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0102C4C0-1A7D-4AB7-9817-44E6B0DB761E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "81DDF486-4185-48EE-869E-0AA6726C31F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF45A8E1-F6B1-42BD-9168-12062FA6EAEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5757B9B-2759-439A-9A6D-CCDD6C8C8940",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCD71268-EAA2-477B-8AC4-DE4853A262B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "529B2115-A191-4F3F-8F8C-A38B7C45463A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E2D0508-C418-48CE-BF83-39F893688D1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BC80EBD-14D3-44A6-A06F-0549722E0EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7859797F-E9AD-4429-BD2C-A24EC24A5D03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisknow:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC6FE17C-3B08-4675-9F73-5DC0C2438BB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B12A09BE-1EE0-46D5-B3F0-E8847409A49A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A5A734E-1DD3-4924-8AC1-97048FA3270F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisknow:beta_7:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AE2F09E-4B5A-4EDF-A48A-BCBBAA80156B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:s800i:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C3A0A08-4107-4B8B-AE7E-DC23849A54DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:s800i:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9320928D-D83C-4258-AF62-AB2D1F50D972",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:s800i:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "569084D1-977D-41FC-A444-0B3F5199DDD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:s800i:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D182FB-761C-4F08-A776-B613FAC55230",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:s800i:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7B5EDAB-61DD-4864-A159-39292D339DA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses."
    },
    {
      "lang": "es",
      "value": "El servidor AsteriskGUI HTTP en Asterisk Open Source 1.4.x antes de 1.4.19-rc3 y 1.6.x antes de 1.6.0-beta6, Business Edition C.x.x antes de C.1.6, AsteriskNOW antes de 1.0.2, Appliance Developer Kit antes de la revisi\u00f3n 104704 y s800i 1.0.x antes de 1.1.0.2 genera valores ID de gesti\u00f3n no lo suficientemente aleatorios, lo que facilita a atacantes remotos secuestrar una sesi\u00f3n de gesti\u00f3n a trav\u00e9s de una serie de adivinaciones de ID."
    }
  ],
  "id": "CVE-2008-1390",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-03-24T17:44:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://downloads.digium.com/pub/security/AST-2008-005.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29449"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29470"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/3764"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/489819/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/28316"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1019679"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41304"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://downloads.digium.com/pub/security/AST-2008-005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29449"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29470"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/3764"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/489819/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28316"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1019679"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41304"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-255"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-05-07 19:19
Modified
2025-04-09 00:30
Severity ?
Summary
The IAX2 channel driver (chan_iax2) in Asterisk before 20070504 does not properly null terminate data, which allows remote attackers to trigger loss of transmitted data, and possibly obtain sensitive information (memory contents) or cause a denial of service (application crash), by sending a frame that lacks a 0 byte.
Impacted products
Vendor Product Version
asterisk asterisk *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC58B8ED-82EB-4AD1-ADF9-97BAB073D19D",
              "versionEndIncluding": "1.4.4_2007-04-27",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The IAX2 channel driver (chan_iax2) in Asterisk before 20070504 does not properly null terminate data, which allows remote attackers to trigger loss of transmitted data, and possibly obtain sensitive information (memory contents) or cause a denial of service (application crash), by sending a frame that lacks a 0 byte."
    },
    {
      "lang": "es",
      "value": "El controlador del canal IAX2 (chan_iax2) en Asterisk anterior a 20070504 no anula correctamente los datos terminales, lo cual permite a atacantes remotos disparar la p\u00e9rdida de datos transmitidos, y posiblemente obtener informaci\u00f3n sensible (contenido de memoria) o provocar denegaci\u00f3n de servicio (caida de aplicaci\u00f3n), enviando un marco que carece 0 bytes."
    }
  ],
  "id": "CVE-2007-2488",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-05-07T19:19:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://ftp.digium.com/pub/asa/ASA-2007-013.pdf"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/35769"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25134"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25582"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2007/dsa-1358"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/23824"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/1661"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34085"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ftp.digium.com/pub/asa/ASA-2007-013.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/35769"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25134"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25582"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1358"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/23824"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/1661"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34085"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-03-21 19:19
Modified
2025-04-09 00:30
Severity ?
Summary
The channel driver in Asterisk before 1.2.17 and 1.4.x before 1.4.2 allows remote attackers to cause a denial of service (crash) via a SIP INVITE message with an SDP containing one valid and one invalid IP address.
References
cve@mitre.orghttp://asterisk.org/node/48339
cve@mitre.orghttp://marc.info/?l=full-disclosure&m=117432783011737&w=2
cve@mitre.orghttp://secunia.com/advisories/24564
cve@mitre.orghttp://secunia.com/advisories/24719
cve@mitre.orghttp://secunia.com/advisories/25582
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200704-01.xml
cve@mitre.orghttp://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html
cve@mitre.orghttp://www.debian.org/security/2007/dsa-1358
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_34_asterisk.html
cve@mitre.orghttp://www.osvdb.org/34479
cve@mitre.orghttp://www.securityfocus.com/archive/1/463434/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/23031Patch
cve@mitre.orghttp://www.securitytracker.com/id?1017794
cve@mitre.orghttp://www.sineapps.com/news.php?rssid=1707
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/1039
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/33068
af854a3a-2127-422b-91ae-364da2661108http://asterisk.org/node/48339
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=full-disclosure&m=117432783011737&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24564
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24719
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25582
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200704-01.xml
af854a3a-2127-422b-91ae-364da2661108http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1358
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_34_asterisk.html
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/34479
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/463434/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/23031Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1017794
af854a3a-2127-422b-91ae-364da2661108http://www.sineapps.com/news.php?rssid=1707
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/1039
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/33068
Impacted products
Vendor Product Version
asterisk asterisk 1.2.14
asterisk asterisk 1.2.15
asterisk asterisk 1.2.16
asterisk asterisk 1.4.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "26A10E99-3A8C-430A-8FB6-4A55E01A00E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5DF84B2-A104-4FA2-8B02-D243D76ACEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4BA2270-DF93-48FB-A90F-DFBFED05F051",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "593AA737-5AF3-4F7C-B74B-D3F37701C435",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The channel driver in Asterisk before 1.2.17 and 1.4.x before 1.4.2 allows remote attackers to cause a denial of service (crash) via a SIP INVITE message with an SDP containing one valid and one invalid IP address."
    },
    {
      "lang": "es",
      "value": "El controlador del canal en Asterisk en versiones anteriores a 1.2.17 y 1.4.x en versiones anteriores a 1.4.2 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de un mensaje SIP INVITE con un SDP que contiene una direcci\u00f3n IP v\u00e1lida y otra no v\u00e1lida."
    }
  ],
  "id": "CVE-2007-1561",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-03-21T19:19:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://asterisk.org/node/48339"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=full-disclosure\u0026m=117432783011737\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/24564"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/24719"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25582"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200704-01.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2007/dsa-1358"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/34479"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/463434/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/23031"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1017794"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.sineapps.com/news.php?rssid=1707"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/1039"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33068"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://asterisk.org/node/48339"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=full-disclosure\u0026m=117432783011737\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24564"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24719"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25582"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200704-01.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1358"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/34479"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/463434/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/23031"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1017794"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.sineapps.com/news.php?rssid=1707"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/1039"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33068"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-03-20 00:44
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header.
References
cve@mitre.orghttp://downloads.digium.com/pub/security/AST-2008-003.htmlPatch
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html
cve@mitre.orghttp://secunia.com/advisories/29426Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/29456Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/29470Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/29782Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/29957Vendor Advisory
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200804-13.xml
cve@mitre.orghttp://securitytracker.com/id?1019629
cve@mitre.orghttp://www.asterisk.org/node/48466
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1525
cve@mitre.orghttp://www.securityfocus.com/archive/1/489818/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/28310
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/0928
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/41308
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html
af854a3a-2127-422b-91ae-364da2661108http://downloads.digium.com/pub/security/AST-2008-003.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29426Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29456Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29470Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29782Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29957Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200804-13.xml
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1019629
af854a3a-2127-422b-91ae-364da2661108http://www.asterisk.org/node/48466
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1525
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/489818/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28310
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0928
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/41308
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html
Impacted products
Vendor Product Version
asterisk asterisk a
asterisk asterisk b.1.3.2
asterisk asterisk b.1.3.3
asterisk asterisk b.2.2.0
asterisk asterisk b.2.2.1
asterisk asterisk b.2.3.1
asterisk asterisk b.2.3.2
asterisk asterisk b.2.3.3
asterisk asterisk b.2.3.4
asterisk asterisk b.2.3.5
asterisk asterisk b.2.3.6
asterisk asterisk c.1.0_beta7
asterisk asterisk c.1.0_beta8
asterisk asterisk c.1.6
asterisk asterisk c.1.6.1
asterisk asterisk_appliance_developer_kit *
asterisk asterisk_appliance_developer_kit 0.2
asterisk asterisk_appliance_developer_kit 0.3
asterisk asterisk_appliance_developer_kit 0.4
asterisk asterisk_appliance_developer_kit 0.5
asterisk asterisk_appliance_developer_kit 0.6
asterisk asterisk_appliance_developer_kit 0.6.0
asterisk asterisk_appliance_developer_kit 0.7
asterisk asterisk_appliance_developer_kit 0.8
asterisk asterisk_appliance_developer_kit 1.3
asterisk asterisk_business_edition *
asterisk asterisk_business_edition *
asterisk asterisk_business_edition *
asterisk asterisknow *
asterisk asterisknow 1.0
asterisk open_source *
asterisk open_source *
asterisk open_source *
asterisk open_source 1.0
asterisk open_source 1.0.0
asterisk open_source 1.0.1
asterisk open_source 1.0.2
asterisk open_source 1.0.3
asterisk open_source 1.0.3.4
asterisk open_source 1.0.4
asterisk open_source 1.0.5
asterisk open_source 1.0.6
asterisk open_source 1.0.7
asterisk open_source 1.0.8
asterisk open_source 1.0.9
asterisk open_source 1.0.11
asterisk open_source 1.0.11.1
asterisk open_source 1.0.12
asterisk open_source 1.2.0
asterisk open_source 1.2.0
asterisk open_source 1.2.0
asterisk open_source 1.2.0
asterisk open_source 1.2.0beta2
asterisk open_source 1.2.1
asterisk open_source 1.2.2
asterisk open_source 1.2.3
asterisk open_source 1.2.4
asterisk open_source 1.2.5
asterisk open_source 1.2.6
asterisk open_source 1.2.7
asterisk open_source 1.2.7.1
asterisk open_source 1.2.8
asterisk open_source 1.2.9
asterisk open_source 1.2.9.1
asterisk open_source 1.2.10
asterisk open_source 1.2.11
asterisk open_source 1.2.12
asterisk open_source 1.2.12.1
asterisk open_source 1.2.13
asterisk open_source 1.2.14
asterisk open_source 1.2.15
asterisk open_source 1.2.16
asterisk open_source 1.2.17
asterisk open_source 1.2.18
asterisk open_source 1.2.19
asterisk open_source 1.2.20
asterisk open_source 1.2.21
asterisk open_source 1.2.21.1
asterisk open_source 1.2.22
asterisk open_source 1.2.23
asterisk open_source 1.2.24
asterisk open_source 1.2.25
asterisk open_source 1.2.26.1
asterisk open_source 1.2.26.2
asterisk open_source 1.4.0
asterisk open_source 1.4.0
asterisk open_source 1.4.0
asterisk open_source 1.4.0
asterisk open_source 1.4.1
asterisk open_source 1.4.10
asterisk open_source 1.4.10.1
asterisk open_source 1.4.11
asterisk open_source 1.4.12
asterisk open_source 1.4.12.1
asterisk open_source 1.4.13
asterisk open_source 1.4.14
asterisk open_source 1.4.15
asterisk open_source 1.4.16
asterisk open_source 1.4.16.1
asterisk open_source 1.4.16.2
asterisk open_source 1.4.18
asterisk open_source 1.4.19
asterisk s800i *
asterisk s800i 1.0
asterisk s800i 1.0.1
asterisk s800i 1.0.2
asterisk s800i 1.0.3
asterisk s800i 1.0.3.3
asterisk s800i 1.1.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:a:*:business:*:*:*:*:*",
              "matchCriteriaId": "C6702046-43CF-4C84-9F76-24716C9F7D20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.2:*:business:*:*:*:*:*",
              "matchCriteriaId": "524CF00B-1B36-4C1F-80B4-28349891669B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.3:*:business:*:*:*:*:*",
              "matchCriteriaId": "2942FA48-42CE-4E67-A5BF-7852652EDE28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.2.0:*:business:*:*:*:*:*",
              "matchCriteriaId": "4160A834-9194-474C-819B-60627E470D13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.2.1:*:business:*:*:*:*:*",
              "matchCriteriaId": "D81F6E55-80F1-4770-9FF0-305EEEF3C4E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.1:*:business:*:*:*:*:*",
              "matchCriteriaId": "087DC9EC-0DF2-48AE-BB62-8DDF95C3EC56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.2:*:business:*:*:*:*:*",
              "matchCriteriaId": "471032A5-5EB6-44D1-91C8-BEA42C1E205A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.3:*:business:*:*:*:*:*",
              "matchCriteriaId": "6FEB3FCA-065E-4C32-A4C7-F2C79F214F17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.4:*:business:*:*:*:*:*",
              "matchCriteriaId": "636D765F-C47B-4762-9419-D7B51FA38AEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.5:*:business:*:*:*:*:*",
              "matchCriteriaId": "36F29EE8-E05F-4F0A-B0FA-66C551856C3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.6:*:business:*:*:*:*:*",
              "matchCriteriaId": "CEAA72FE-E13C-4363-AF5C-7D1CEEE2FA77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:c.1.0_beta7:*:business:*:*:*:*:*",
              "matchCriteriaId": "D0A87D63-35F5-47D7-893B-E8B179B16C3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:c.1.0_beta8:*:business:*:*:*:*:*",
              "matchCriteriaId": "95C1809E-9031-483F-B873-160284FA71D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:c.1.6:*:business:*:*:*:*:*",
              "matchCriteriaId": "E35C336A-A786-476B-8B9F-E682D999B6AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk:c.1.6.1:*:business:*:*:*:*:*",
              "matchCriteriaId": "8121721B-EBC6-44EA-86D6-7B0FF1C8FF52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEF22BFB-2B22-4FBE-AE35-D7BC2A461865",
              "versionEndIncluding": "1.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C05B437-C292-4AA0-8AFE-1CA07CD80034",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0102C4C0-1A7D-4AB7-9817-44E6B0DB761E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "81DDF486-4185-48EE-869E-0AA6726C31F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF45A8E1-F6B1-42BD-9168-12062FA6EAEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5757B9B-2759-439A-9A6D-CCDD6C8C8940",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4548D39-0562-4946-AA51-A7C1A31AEE8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCD71268-EAA2-477B-8AC4-DE4853A262B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "529B2115-A191-4F3F-8F8C-A38B7C45463A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B76EFDCA-20EC-4C62-A0AD-CBD317D69441",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4EC98BF-00C0-48F5-ADFA-DB8AC6E95F3A",
              "versionEndIncluding": "a",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E140B81-4528-4BCC-AE60-B91DD4B2C9FE",
              "versionEndIncluding": "b.2.5.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E8CF6B9-050B-426B-86FC-8A32E8C09A68",
              "versionEndIncluding": "c.1.6.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisknow:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7C58E6B-AECC-48AF-8059-61772690776A",
              "versionEndIncluding": "1.0.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisknow:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC6FE17C-3B08-4675-9F73-5DC0C2438BB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A66DC4A6-290C-48ED-A0F8-8DC05EA0AAC6",
              "versionEndIncluding": "1.2.26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CEDD6A3-13B1-4553-8BAD-93DB5203F3B6",
              "versionEndIncluding": "1.4.17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:*:rc-2:*:*:*:*:*:*",
              "matchCriteriaId": "F4AB8D8F-15AC-4516-85A2-B5D2B5B3DF04",
              "versionEndIncluding": "1.4.19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "678DB154-4363-42FF-8B28-367923FC6595",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8F2C378-FF0E-4765-9F66-625C4064D5CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A55A9295-F632-4856-90A1-38371EB98589",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FAE6AF1-884D-41F7-B174-9E13C7719C99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCA9E35B-9A6B-42F2-9315-9C7D09F62227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "89B1F293-4F0F-48FD-A1F1-1230B94D87D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDF7EC20-A424-45E5-B7E4-3CC86075858C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C790E105-55C8-4CDC-9FA8-E1FF6F130A67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "44C860EF-2B29-4995-B942-000CC43FDD14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ADB80EF-C724-44BA-88FC-24087799D0C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "78B39BE8-7E2D-42DF-8633-44CAD5662777",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F39036E3-0027-4C72-9DEB-9A6E2B4512C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A037E6F9-3EF7-4EEB-AC16-081421BCE40D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A7EC02A-9C9E-4589-BBB3-1908D3078A7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C70FA9C-6F3B-4BDF-97FB-81D06AB0EE65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F7971E1-F136-4ADC-95EC-BC4F92E838CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "E62D108C-862D-4BDB-BE37-285AA4C9C59A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "CF1422F3-829D-498C-83A6-02989DFB70A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEB9D69-A404-4053-92F9-CAC3481AFF1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0beta2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7B2F43B-8B69-4BF6-86B7-A225175FF068",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "27202966-2C41-4964-9497-1887D2A834C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1471B5A2-15BE-4E7C-BA49-2E6002F7C8EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7108D72F-5AFD-4EEF-B2A9-CA4FA792E193",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "107DA2D8-FE7C-4B70-856D-43D58B988694",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD71DD9-8A15-45E2-9FB3-F0544D7E1B80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C14614F-4E27-40A6-9E56-2B1DBB10330B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A2F2F5A-66FD-4057-917C-66332A88D83E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "399B0206-B48B-46EF-8CA6-A6E5A2550B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "26E9760F-C0EB-47BB-8DA4-CC7815099DAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C510A9A-C3E2-4AF8-9919-1A22E918CDEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BD915CD-A7D3-4305-A6C0-290C648A226C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E79CCE5-C29B-4726-8D2F-BC20F70959BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "F29C13DB-6F04-4B41-90A2-2408D70F3641",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F4F734E-0E78-4957-B323-8E9FBA7FF15C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A4B117B-E945-4033-A79D-10DFAA3DF18B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA6D866F-8189-4FFD-AA24-47C0A015C246",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4EBFB79-C269-4132-BFAB-451F66CE8289",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9E1028E-2C07-4BA3-B891-FA853A87B280",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E74F577-70BD-4FAF-BCFD-10CD21FC5601",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "57BB03E2-E61C-4A94-82DF-8720698CE271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B30A36F-5CE6-4246-8752-176FB5999C1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0F76DFD-4DAC-4B02-8967-B242CDEEF6C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A59BC20-3217-4584-9196-D1CD9E0D6B52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "56F728BA-FC9E-4EEE-9A08-C9C7433BD8D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C64DF29-5B3D-401E-885E-8E37FD577254",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A7BF52A-2FF8-40ED-B757-28A1101DE8F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A321C2D-852B-4498-ADD6-79956410AB94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D5F0DCF-C6A2-4A09-90C9-D70F174FDEF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C820538E-14EC-43C1-80DB-6AAE4905EF0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A6D8FD0-C8C1-4868-9AF1-96B1949C18AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "72A840B4-216B-4063-997F-791FBC8C8658",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "967DF432-DEF4-4FA2-8C8D-19A7FB663A33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "40850BF4-E252-4667-9B46-9B6FEF6E997D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "1BB01DD1-B29B-4210-88CC-9ADB3148A410",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "5C0FA6A3-BFA9-4397-B75B-75C8357C36B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "295D4042-2D3C-481B-B969-2DDAC1161198",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "044FD0D0-FC92-4A01-B0D4-11A703EF21FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3477EC1A-9634-492C-B052-35770A9C9F4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C90F104-FA2C-4091-B149-1774AC982C0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9328768-7C08-4143-B5F8-F5C2D735D21A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C04E2B3-094B-4828-A2FC-BB66244A9F73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BDE3D31-4BB2-45A3-B085-8C91152A3152",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE0107D4-395E-45F1-B963-7618CCC007D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "53B8E11B-4984-45A8-A107-D276205988B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "2495DB98-F923-4E60-86EC-2DBB7A98C90C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E186D125-996E-4900-A2B8-5CDC8B5D5136",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "27DC6CF7-4DF8-4472-A684-8CCB5E26FCFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A838577-2BA1-4792-8B69-6FB07FFD7727",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "C4FF0F09-0268-480F-A2F3-6F8C3F323EEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:s800i:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D1E04DC-AE6A-4536-8E45-36494E51B036",
              "versionEndIncluding": "1.1.0.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:s800i:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C3A0A08-4107-4B8B-AE7E-DC23849A54DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:s800i:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9320928D-D83C-4258-AF62-AB2D1F50D972",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:s800i:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "569084D1-977D-41FC-A444-0B3F5199DDD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:s800i:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D182FB-761C-4F08-A776-B613FAC55230",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:s800i:1.0.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9046D49-6878-4571-8B9E-2FBD5BA80D19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:s800i:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7B5EDAB-61DD-4864-A159-39292D339DA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en Asterisk Open Source versiones 1.2.x anteriores a 1.2.27, 1.4.x anteriores a 1.4.18.1 y 1.4.19-rc3; en Business Edition versiones A.x.x, B.x.x anteriores a B.2.5.1, y C.x.x anteriores a C.1.6.2; en AsteriskNOW versiones 1.0.x anteriores a 1.0.2; Appliance Developer Kit anteriores a 1.4 revisi\u00f3n 109393; y s800i versiones 1.0.x anteriores a 1.1.0.2 permite a atacantes remotos acceder al controlador del canal SIP mediante la utilizaci\u00f3n de una cabecera From especialmente construida."
    }
  ],
  "id": "CVE-2008-1332",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 8.8,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 9.2,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-03-20T00:44:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://downloads.digium.com/pub/security/AST-2008-003.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29426"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29456"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29470"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29782"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29957"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200804-13.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1019629"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.asterisk.org/node/48466"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2008/dsa-1525"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/489818/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/28310"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/0928"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41308"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://downloads.digium.com/pub/security/AST-2008-003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29426"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29456"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29470"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29782"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29957"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200804-13.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1019629"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.asterisk.org/node/48466"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1525"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/489818/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28310"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0928"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41308"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}