ID CVE-2008-2543
Summary The ooh323 channel driver in Asterisk Addons 1.2.x before 1.2.9 and Asterisk-Addons 1.4.x before 1.4.7 creates a remotely accessible TCP port that is intended solely for localhost communication, and interprets some TCP application-data fields as addresses of memory to free, which allows remote attackers to cause a denial of service (daemon crash) via crafted TCP packets.
References
Vulnerable Configurations
  • cpe:2.3:a:asterisk:asterisk-addons:1.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk-addons:1.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk-addons:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk-addons:1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk-addons:1.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk-addons:1.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk-addons:1.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk-addons:1.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk-addons:1.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk-addons:1.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk-addons:1.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk-addons:1.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk-addons:1.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk-addons:1.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk-addons:1.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk-addons:1.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk-addons:1.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk-addons:1.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk-addons:1.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk-addons:1.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk-addons:1.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk-addons:1.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk-addons:1.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk-addons:1.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk-addons:1.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk-addons:1.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk-addons:1.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk-addons:1.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk-addons:1.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk-addons:1.4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk-addons:1.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk-addons:1.4.6:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 15-10-2018 - 22:04)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
bid 29567
bugtraq
  • 20080604 AST-2008-009: (Corrected subject) Remote crash vulnerability in ooh323 channel driver
  • 20080604 AST-2008-009: AST-2008-007 Cryptographic keys generated by OpenSSL on Debian-based systems compromised
confirm http://downloads.digium.com/pub/security/AST-2008-009.html
sectrack 1020202
secunia 30555
vupen ADV-2008-1747
xf asterisk-addons-ooh323-dos(42869)
Last major update 15-10-2018 - 22:04
Published 05-06-2008 - 20:32
Last modified 15-10-2018 - 22:04
Back to Top