fkie_cve-2008-3264
Vulnerability from fkie_nvd
Published
2008-07-24 15:41
Modified
2025-04-09 00:30
Severity ?
Summary
The FWDOWNL firmware-download implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (traffic amplification) via an IAX2 FWDOWNL request.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9282AC42-E98A-4BC2-B46D-15B5776C961F", "vulnerable": false }, { "criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "83DBFD69-2500-46C1-827C-1493CF896F49", "vulnerable": false }, { "criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F53C8D19-507A-45B6-9B19-C733460F0739", "vulnerable": false }, { "criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "09AEF231-3438-420E-B2B0-1B876A929033", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C05B437-C292-4AA0-8AFE-1CA07CD80034", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "0102C4C0-1A7D-4AB7-9817-44E6B0DB761E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "81DDF486-4185-48EE-869E-0AA6726C31F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "CF45A8E1-F6B1-42BD-9168-12062FA6EAEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "C5757B9B-2759-439A-9A6D-CCDD6C8C8940", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E4548D39-0562-4946-AA51-A7C1A31AEE8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "FCD71268-EAA2-477B-8AC4-DE4853A262B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "529B2115-A191-4F3F-8F8C-A38B7C45463A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:a:*:*:*:*:*:*:*", "matchCriteriaId": "313B3A38-8DEA-4D62-A1A4-0B6011E81870", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b:*:*:*:*:*:*:*", "matchCriteriaId": "B24F3283-4809-40B1-8166-9D1C3A4C9104", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "802F8680-AB38-41AF-BFC8-F6927F6B1626", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "BCAE8D90-B032-4C60-B487-BE655D00FFAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "AB64A872-B7B8-46A8-81E4-49EDAC160531", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "21000270-C9B9-430C-A252-763887A15835", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "12F7CF45-5482-4947-8F1D-48C746987475", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "7B64995D-7892-49AB-A89D-A5D15615C5D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "0397DBD4-EA00-444A-9008-4932F99DF325", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "6FCD865F-BC39-4255-A797-6E5945773337", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "D7203093-7209-4184-92CB-08AD73FAC379", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E4956871-4DD3-4299-8BEB-9D98A4449A42", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "0F04F844-79C4-41F3-9671-8B46460D0AAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "8936B494-E647-498B-8380-AE4DAD458533", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "1B234F33-5233-42A3-B95A-3A3558B4DDCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c:*:*:*:*:*:*:*", "matchCriteriaId": "4D47534E-8EBC-44B5-8770-65BBA7C3F3DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta7:*:*:*:*:*:*:*", "matchCriteriaId": "5BC80EBD-14D3-44A6-A06F-0549722E0EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta8:*:*:*:*:*:*:*", "matchCriteriaId": "7859797F-E9AD-4429-BD2C-A24EC24A5D03", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "E5C988FD-CFB9-4763-BE5A-B89FB3538FD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "00A6DAD0-D4C3-4A58-A35A-991E04B50EC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "6413B123-65DE-4483-A8A0-F5F30A809570", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "502AEBA1-2A6D-4367-86AB-F2948207FCA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "93DA4919-A365-48B6-84D6-6A7D97941A13", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:*", "matchCriteriaId": "B12A09BE-1EE0-46D5-B3F0-E8847409A49A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:*", "matchCriteriaId": "7A5A734E-1DD3-4924-8AC1-97048FA3270F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:beta_7:*:*:*:*:*:*:*", "matchCriteriaId": "3AE2F09E-4B5A-4EDF-A48A-BCBBAA80156B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisknow:pre-release:*:*:*:*:*:*:*", "matchCriteriaId": "F420EB4D-5B9C-4BBA-AAC5-5E0E83CD1F74", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "678DB154-4363-42FF-8B28-367923FC6595", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "E8F2C378-FF0E-4765-9F66-625C4064D5CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "A55A9295-F632-4856-90A1-38371EB98589", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7FAE6AF1-884D-41F7-B174-9E13C7719C99", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DCA9E35B-9A6B-42F2-9315-9C7D09F62227", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "89B1F293-4F0F-48FD-A1F1-1230B94D87D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DDF7EC20-A424-45E5-B7E4-3CC86075858C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "C790E105-55C8-4CDC-9FA8-E1FF6F130A67", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "44C860EF-2B29-4995-B942-000CC43FDD14", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "1ADB80EF-C724-44BA-88FC-24087799D0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "78B39BE8-7E2D-42DF-8633-44CAD5662777", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "F39036E3-0027-4C72-9DEB-9A6E2B4512C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "A037E6F9-3EF7-4EEB-AC16-081421BCE40D", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "6A7EC02A-9C9E-4589-BBB3-1908D3078A7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "6C70FA9C-6F3B-4BDF-97FB-81D06AB0EE65", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9F7971E1-F136-4ADC-95EC-BC4F92E838CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0beta1:*:*:*:*:*:*:*", "matchCriteriaId": "7435F043-F92B-4635-93CC-A2C39AAE1BCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0beta2:*:*:*:*:*:*:*", "matchCriteriaId": "C7B2F43B-8B69-4BF6-86B7-A225175FF068", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "27202966-2C41-4964-9497-1887D2A834C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1471B5A2-15BE-4E7C-BA49-2E6002F7C8EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "7108D72F-5AFD-4EEF-B2A9-CA4FA792E193", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "107DA2D8-FE7C-4B70-856D-43D58B988694", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "ABD71DD9-8A15-45E2-9FB3-F0544D7E1B80", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "5C14614F-4E27-40A6-9E56-2B1DBB10330B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "7A2F2F5A-66FD-4057-917C-66332A88D83E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "399B0206-B48B-46EF-8CA6-A6E5A2550B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "26E9760F-C0EB-47BB-8DA4-CC7815099DAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "4C510A9A-C3E2-4AF8-9919-1A22E918CDEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "6BD915CD-A7D3-4305-A6C0-290C648A226C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "9E79CCE5-C29B-4726-8D2F-BC20F70959BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "F29C13DB-6F04-4B41-90A2-2408D70F3641", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "0F4F734E-0E78-4957-B323-8E9FBA7FF15C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A4B117B-E945-4033-A79D-10DFAA3DF18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EA6D866F-8189-4FFD-AA24-47C0A015C246", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "A4EBFB79-C269-4132-BFAB-451F66CE8289", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "E9E1028E-2C07-4BA3-B891-FA853A87B280", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "9E74F577-70BD-4FAF-BCFD-10CD21FC5601", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "57BB03E2-E61C-4A94-82DF-8720698CE271", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "1B30A36F-5CE6-4246-8752-176FB5999C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "E0F76DFD-4DAC-4B02-8967-B242CDEEF6C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "6A59BC20-3217-4584-9196-D1CD9E0D6B52", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:*", "matchCriteriaId": "56F728BA-FC9E-4EEE-9A08-C9C7433BD8D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C64DF29-5B3D-401E-885E-8E37FD577254", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A7BF52A-2FF8-40ED-B757-28A1101DE8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:*", "matchCriteriaId": "7A321C2D-852B-4498-ADD6-79956410AB94", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:*", "matchCriteriaId": "9D5F0DCF-C6A2-4A09-90C9-D70F174FDEF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:*", "matchCriteriaId": "C820538E-14EC-43C1-80DB-6AAE4905EF0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26:*:*:*:*:*:*:*", "matchCriteriaId": "E9562112-2505-4F78-86DE-F30EFAEE47D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A6D8FD0-C8C1-4868-9AF1-96B1949C18AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:*", "matchCriteriaId": "72A840B4-216B-4063-997F-791FBC8C8658", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.27:*:*:*:*:*:*:*", "matchCriteriaId": "BE47A547-26E7-48F9-B0A6-2F65E04A1EDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.28:*:*:*:*:*:*:*", "matchCriteriaId": "E1AEB744-FCF2-4A41-8866-9D1D20E6C6B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.29:*:*:*:*:*:*:*", "matchCriteriaId": "51E5EB34-30AD-4E81-8BD4-4AB905E52B82", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "967DF432-DEF4-4FA2-8C8D-19A7FB663A33", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "295D4042-2D3C-481B-B969-2DDAC1161198", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "99E9EE2A-56AD-42BC-8CB0-D34091849B0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "96877A3E-B54B-4F31-B281-76CDC98B2D02", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "6D0B4503-42A6-4D88-954E-A662E91EC204", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "A4B73813-BCD8-429E-B9B9-D6665E026BC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "5BBA3ECC-4F40-41CD-A6D7-BBD680DDBACC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "9CBE2156-AF86-4C72-B33D-3FF83930F828", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "61408884-FBBF-4D94-A552-F99AB46DCED6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "4A527277-D97D-4B74-906F-7481BDBD96D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "D8B57A32-7B83-4783-A244-C26301970444", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "044FD0D0-FC92-4A01-B0D4-11A703EF21FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "3477EC1A-9634-492C-B052-35770A9C9F4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "1C90F104-FA2C-4091-B149-1774AC982C0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "C9328768-7C08-4143-B5F8-F5C2D735D21A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "6C04E2B3-094B-4828-A2FC-BB66244A9F73", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "4BDE3D31-4BB2-45A3-B085-8C91152A3152", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "CE0107D4-395E-45F1-B963-7618CCC007D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "53B8E11B-4984-45A8-A107-D276205988B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "2495DB98-F923-4E60-86EC-2DBB7A98C90C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "E186D125-996E-4900-A2B8-5CDC8B5D5136", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "27DC6CF7-4DF8-4472-A684-8CCB5E26FCFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "88576385-EF03-408B-9775-B52E6AFFE48A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "1A838577-2BA1-4792-8B69-6FB07FFD7727", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "CDEED3E1-13E0-46E6-8AAB-D24D2D04AE4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:*:*:*:*:*:*:*", "matchCriteriaId": "ED2BF36F-CF10-4F24-970B-3D0BB7561C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "FB1593E1-BF21-4DB9-A18E-9F221F3F9022", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19_rc3:*:*:*:*:*:*:*", "matchCriteriaId": "2D41604A-21CB-4EF3-85E8-8CD170C8013F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4_revision_95946:*:*:*:*:*:*:*", "matchCriteriaId": "E3C6272B-D0C4-4EA5-AEE4-5A45DAA2DDE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4beta:*:*:*:*:*:*:*", "matchCriteriaId": "2A8012CE-4D4B-4131-87E7-16D7907E3BB3", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The FWDOWNL firmware-download implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (traffic amplification) via an IAX2 FWDOWNL request." }, { "lang": "es", "value": "La implementaci\u00f3n FWDOWNL firmware-download en Asterisk Open Source 1.0.x, 1.2.x antes de 1.2.30 y 1.4.x antes de 1.4.21.2; Business Edition A.x.x, B.x.x antes de B.2.5.4 y C.x.x antes de C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; y s800i 1.0.x antes de 1.2.0.1 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (amplificaci\u00f3n del tr\u00e1fico) mediante una petici\u00f3n IAX2 FWDOWNL." } ], "id": "CVE-2008-3264", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-07-24T15:41:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://downloads.digium.com/pub/security/AST-2008-011.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31178" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/31194" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/34982" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200905-01.xml" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/494676/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/30350" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1020536" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/2168/references" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43955" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://downloads.digium.com/pub/security/AST-2008-011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31178" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31194" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34982" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200905-01.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/494676/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/30350" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1020536" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2168/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43955" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…