fkie_cve-2008-3264
Vulnerability from fkie_nvd
Published
2008-07-24 15:41
Modified
2025-04-09 00:30
Severity ?
Summary
The FWDOWNL firmware-download implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (traffic amplification) via an IAX2 FWDOWNL request.
References
cve@mitre.orghttp://downloads.digium.com/pub/security/AST-2008-011.html
cve@mitre.orghttp://secunia.com/advisories/31178Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/31194
cve@mitre.orghttp://secunia.com/advisories/34982
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200905-01.xml
cve@mitre.orghttp://www.securityfocus.com/archive/1/494676/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/30350
cve@mitre.orghttp://www.securitytracker.com/id?1020536
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/2168/references
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/43955
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html
af854a3a-2127-422b-91ae-364da2661108http://downloads.digium.com/pub/security/AST-2008-011.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31178Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31194
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34982
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200905-01.xml
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/494676/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/30350
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1020536
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2168/references
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/43955
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html
Impacted products
Vendor Product Version
asterisk s800i_appliance 1.0
asterisk s800i_appliance 1.0.1
asterisk s800i_appliance 1.0.2
asterisk s800i_appliance 1.0.3
asterisk asterisk_appliance_developer_kit 0.2
asterisk asterisk_appliance_developer_kit 0.3
asterisk asterisk_appliance_developer_kit 0.4
asterisk asterisk_appliance_developer_kit 0.5
asterisk asterisk_appliance_developer_kit 0.6
asterisk asterisk_appliance_developer_kit 0.6.0
asterisk asterisk_appliance_developer_kit 0.7
asterisk asterisk_appliance_developer_kit 0.8
asterisk asterisk_business_edition a
asterisk asterisk_business_edition b
asterisk asterisk_business_edition b.1.3.2
asterisk asterisk_business_edition b.1.3.3
asterisk asterisk_business_edition b.2.2.0
asterisk asterisk_business_edition b.2.2.1
asterisk asterisk_business_edition b.2.3.1
asterisk asterisk_business_edition b.2.3.2
asterisk asterisk_business_edition b.2.3.3
asterisk asterisk_business_edition b.2.3.4
asterisk asterisk_business_edition b.2.3.6
asterisk asterisk_business_edition b.2.5.0
asterisk asterisk_business_edition b.2.5.3
asterisk asterisk_business_edition b2.5.1
asterisk asterisk_business_edition b2.5.2
asterisk asterisk_business_edition c
asterisk asterisk_business_edition c.1.0-beta7
asterisk asterisk_business_edition c.1.0-beta8
asterisk asterisk_business_edition c.1.6
asterisk asterisk_business_edition c.1.6.1
asterisk asterisk_business_edition c.1.6.2
asterisk asterisk_business_edition c1.8.0
asterisk asterisk_business_edition c1.8.1
asterisk asterisknow beta_5
asterisk asterisknow beta_6
asterisk asterisknow beta_7
asterisk asterisknow pre-release
asterisk open_source 1.0
asterisk open_source 1.0.0
asterisk open_source 1.0.1
asterisk open_source 1.0.2
asterisk open_source 1.0.3
asterisk open_source 1.0.3.4
asterisk open_source 1.0.4
asterisk open_source 1.0.5
asterisk open_source 1.0.6
asterisk open_source 1.0.7
asterisk open_source 1.0.8
asterisk open_source 1.0.9
asterisk open_source 1.0.11
asterisk open_source 1.0.11.1
asterisk open_source 1.0.12
asterisk open_source 1.2.0
asterisk open_source 1.2.0beta1
asterisk open_source 1.2.0beta2
asterisk open_source 1.2.1
asterisk open_source 1.2.2
asterisk open_source 1.2.3
asterisk open_source 1.2.4
asterisk open_source 1.2.5
asterisk open_source 1.2.6
asterisk open_source 1.2.7
asterisk open_source 1.2.7.1
asterisk open_source 1.2.8
asterisk open_source 1.2.9
asterisk open_source 1.2.9.1
asterisk open_source 1.2.10
asterisk open_source 1.2.11
asterisk open_source 1.2.12
asterisk open_source 1.2.12.1
asterisk open_source 1.2.13
asterisk open_source 1.2.14
asterisk open_source 1.2.15
asterisk open_source 1.2.16
asterisk open_source 1.2.17
asterisk open_source 1.2.18
asterisk open_source 1.2.19
asterisk open_source 1.2.20
asterisk open_source 1.2.21
asterisk open_source 1.2.21.1
asterisk open_source 1.2.22
asterisk open_source 1.2.23
asterisk open_source 1.2.24
asterisk open_source 1.2.25
asterisk open_source 1.2.26
asterisk open_source 1.2.26.1
asterisk open_source 1.2.26.2
asterisk open_source 1.2.27
asterisk open_source 1.2.28
asterisk open_source 1.2.29
asterisk open_source 1.4.0
asterisk open_source 1.4.1
asterisk open_source 1.4.2
asterisk open_source 1.4.3
asterisk open_source 1.4.4
asterisk open_source 1.4.5
asterisk open_source 1.4.6
asterisk open_source 1.4.7
asterisk open_source 1.4.7.1
asterisk open_source 1.4.8
asterisk open_source 1.4.9
asterisk open_source 1.4.10
asterisk open_source 1.4.10.1
asterisk open_source 1.4.11
asterisk open_source 1.4.12
asterisk open_source 1.4.12.1
asterisk open_source 1.4.13
asterisk open_source 1.4.14
asterisk open_source 1.4.15
asterisk open_source 1.4.16
asterisk open_source 1.4.16.1
asterisk open_source 1.4.16.2
asterisk open_source 1.4.17
asterisk open_source 1.4.18
asterisk open_source 1.4.18.1
asterisk open_source 1.4.19
asterisk open_source 1.4.19.1
asterisk open_source 1.4.19_rc3
asterisk open_source 1.4_revision_95946
asterisk open_source 1.4beta



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9282AC42-E98A-4BC2-B46D-15B5776C961F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "83DBFD69-2500-46C1-827C-1493CF896F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53C8D19-507A-45B6-9B19-C733460F0739",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:asterisk:s800i_appliance:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "09AEF231-3438-420E-B2B0-1B876A929033",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C05B437-C292-4AA0-8AFE-1CA07CD80034",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0102C4C0-1A7D-4AB7-9817-44E6B0DB761E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "81DDF486-4185-48EE-869E-0AA6726C31F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF45A8E1-F6B1-42BD-9168-12062FA6EAEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5757B9B-2759-439A-9A6D-CCDD6C8C8940",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4548D39-0562-4946-AA51-A7C1A31AEE8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCD71268-EAA2-477B-8AC4-DE4853A262B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "529B2115-A191-4F3F-8F8C-A38B7C45463A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:a:*:*:*:*:*:*:*",
              "matchCriteriaId": "313B3A38-8DEA-4D62-A1A4-0B6011E81870",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b:*:*:*:*:*:*:*",
              "matchCriteriaId": "B24F3283-4809-40B1-8166-9D1C3A4C9104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "802F8680-AB38-41AF-BFC8-F6927F6B1626",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCAE8D90-B032-4C60-B487-BE655D00FFAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB64A872-B7B8-46A8-81E4-49EDAC160531",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "21000270-C9B9-430C-A252-763887A15835",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "12F7CF45-5482-4947-8F1D-48C746987475",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B64995D-7892-49AB-A89D-A5D15615C5D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0397DBD4-EA00-444A-9008-4932F99DF325",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCD865F-BC39-4255-A797-6E5945773337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7203093-7209-4184-92CB-08AD73FAC379",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4956871-4DD3-4299-8BEB-9D98A4449A42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F04F844-79C4-41F3-9671-8B46460D0AAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b2.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8936B494-E647-498B-8380-AE4DAD458533",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b2.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B234F33-5233-42A3-B95A-3A3558B4DDCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D47534E-8EBC-44B5-8770-65BBA7C3F3DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BC80EBD-14D3-44A6-A06F-0549722E0EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7859797F-E9AD-4429-BD2C-A24EC24A5D03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5C988FD-CFB9-4763-BE5A-B89FB3538FD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "00A6DAD0-D4C3-4A58-A35A-991E04B50EC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6413B123-65DE-4483-A8A0-F5F30A809570",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c1.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "502AEBA1-2A6D-4367-86AB-F2948207FCA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "93DA4919-A365-48B6-84D6-6A7D97941A13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B12A09BE-1EE0-46D5-B3F0-E8847409A49A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A5A734E-1DD3-4924-8AC1-97048FA3270F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisknow:beta_7:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AE2F09E-4B5A-4EDF-A48A-BCBBAA80156B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:asterisknow:pre-release:*:*:*:*:*:*:*",
              "matchCriteriaId": "F420EB4D-5B9C-4BBA-AAC5-5E0E83CD1F74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "678DB154-4363-42FF-8B28-367923FC6595",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8F2C378-FF0E-4765-9F66-625C4064D5CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A55A9295-F632-4856-90A1-38371EB98589",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FAE6AF1-884D-41F7-B174-9E13C7719C99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCA9E35B-9A6B-42F2-9315-9C7D09F62227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "89B1F293-4F0F-48FD-A1F1-1230B94D87D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDF7EC20-A424-45E5-B7E4-3CC86075858C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C790E105-55C8-4CDC-9FA8-E1FF6F130A67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "44C860EF-2B29-4995-B942-000CC43FDD14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ADB80EF-C724-44BA-88FC-24087799D0C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "78B39BE8-7E2D-42DF-8633-44CAD5662777",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F39036E3-0027-4C72-9DEB-9A6E2B4512C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A037E6F9-3EF7-4EEB-AC16-081421BCE40D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A7EC02A-9C9E-4589-BBB3-1908D3078A7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C70FA9C-6F3B-4BDF-97FB-81D06AB0EE65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F7971E1-F136-4ADC-95EC-BC4F92E838CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0beta1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7435F043-F92B-4635-93CC-A2C39AAE1BCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0beta2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7B2F43B-8B69-4BF6-86B7-A225175FF068",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "27202966-2C41-4964-9497-1887D2A834C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1471B5A2-15BE-4E7C-BA49-2E6002F7C8EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7108D72F-5AFD-4EEF-B2A9-CA4FA792E193",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "107DA2D8-FE7C-4B70-856D-43D58B988694",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD71DD9-8A15-45E2-9FB3-F0544D7E1B80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C14614F-4E27-40A6-9E56-2B1DBB10330B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A2F2F5A-66FD-4057-917C-66332A88D83E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "399B0206-B48B-46EF-8CA6-A6E5A2550B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "26E9760F-C0EB-47BB-8DA4-CC7815099DAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C510A9A-C3E2-4AF8-9919-1A22E918CDEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BD915CD-A7D3-4305-A6C0-290C648A226C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E79CCE5-C29B-4726-8D2F-BC20F70959BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "F29C13DB-6F04-4B41-90A2-2408D70F3641",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F4F734E-0E78-4957-B323-8E9FBA7FF15C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A4B117B-E945-4033-A79D-10DFAA3DF18B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA6D866F-8189-4FFD-AA24-47C0A015C246",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4EBFB79-C269-4132-BFAB-451F66CE8289",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9E1028E-2C07-4BA3-B891-FA853A87B280",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E74F577-70BD-4FAF-BCFD-10CD21FC5601",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "57BB03E2-E61C-4A94-82DF-8720698CE271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B30A36F-5CE6-4246-8752-176FB5999C1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0F76DFD-4DAC-4B02-8967-B242CDEEF6C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A59BC20-3217-4584-9196-D1CD9E0D6B52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "56F728BA-FC9E-4EEE-9A08-C9C7433BD8D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C64DF29-5B3D-401E-885E-8E37FD577254",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A7BF52A-2FF8-40ED-B757-28A1101DE8F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A321C2D-852B-4498-ADD6-79956410AB94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D5F0DCF-C6A2-4A09-90C9-D70F174FDEF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C820538E-14EC-43C1-80DB-6AAE4905EF0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9562112-2505-4F78-86DE-F30EFAEE47D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A6D8FD0-C8C1-4868-9AF1-96B1949C18AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "72A840B4-216B-4063-997F-791FBC8C8658",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE47A547-26E7-48F9-B0A6-2F65E04A1EDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1AEB744-FCF2-4A41-8866-9D1D20E6C6B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.2.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "51E5EB34-30AD-4E81-8BD4-4AB905E52B82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "967DF432-DEF4-4FA2-8C8D-19A7FB663A33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "295D4042-2D3C-481B-B969-2DDAC1161198",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "99E9EE2A-56AD-42BC-8CB0-D34091849B0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "96877A3E-B54B-4F31-B281-76CDC98B2D02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D0B4503-42A6-4D88-954E-A662E91EC204",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4B73813-BCD8-429E-B9B9-D6665E026BC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BBA3ECC-4F40-41CD-A6D7-BBD680DDBACC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CBE2156-AF86-4C72-B33D-3FF83930F828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "61408884-FBBF-4D94-A552-F99AB46DCED6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A527277-D97D-4B74-906F-7481BDBD96D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8B57A32-7B83-4783-A244-C26301970444",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "044FD0D0-FC92-4A01-B0D4-11A703EF21FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3477EC1A-9634-492C-B052-35770A9C9F4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C90F104-FA2C-4091-B149-1774AC982C0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9328768-7C08-4143-B5F8-F5C2D735D21A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C04E2B3-094B-4828-A2FC-BB66244A9F73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BDE3D31-4BB2-45A3-B085-8C91152A3152",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE0107D4-395E-45F1-B963-7618CCC007D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "53B8E11B-4984-45A8-A107-D276205988B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "2495DB98-F923-4E60-86EC-2DBB7A98C90C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E186D125-996E-4900-A2B8-5CDC8B5D5136",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "27DC6CF7-4DF8-4472-A684-8CCB5E26FCFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "88576385-EF03-408B-9775-B52E6AFFE48A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A838577-2BA1-4792-8B69-6FB07FFD7727",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.18.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDEED3E1-13E0-46E6-8AAB-D24D2D04AE4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED2BF36F-CF10-4F24-970B-3D0BB7561C81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1593E1-BF21-4DB9-A18E-9F221F3F9022",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D41604A-21CB-4EF3-85E8-8CD170C8013F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4_revision_95946:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3C6272B-D0C4-4EA5-AEE4-5A45DAA2DDE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asterisk:open_source:1.4beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A8012CE-4D4B-4131-87E7-16D7907E3BB3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The FWDOWNL firmware-download implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (traffic amplification) via an IAX2 FWDOWNL request."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n FWDOWNL firmware-download en Asterisk Open Source 1.0.x, 1.2.x antes de 1.2.30 y 1.4.x antes de 1.4.21.2; Business Edition A.x.x, B.x.x antes de B.2.5.4 y C.x.x antes de C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; y s800i 1.0.x antes de 1.2.0.1 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (amplificaci\u00f3n del tr\u00e1fico) mediante una petici\u00f3n IAX2 FWDOWNL."
    }
  ],
  "id": "CVE-2008-3264",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-07-24T15:41:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://downloads.digium.com/pub/security/AST-2008-011.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31178"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/31194"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/34982"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200905-01.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/494676/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/30350"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1020536"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/2168/references"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43955"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://downloads.digium.com/pub/security/AST-2008-011.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31178"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31194"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/34982"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200905-01.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/494676/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/30350"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1020536"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/2168/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43955"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…