All the vulnerabilites related to asterisk - asterisk
cve-2007-3764
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/26099 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/24950 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id?1018407 | vdb-entry, x_refsource_SECTRACK | |
http://security.gentoo.org/glsa/glsa-200802-11.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/29051 | third-party-advisory, x_refsource_SECUNIA | |
http://bugs.gentoo.org/show_bug.cgi?id=185713 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35478 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2007/2563 | vdb-entry, x_refsource_VUPEN | |
http://ftp.digium.com/pub/asa/ASA-2007-016.pdf | x_refsource_CONFIRM | |
http://www.debian.org/security/2007/dsa-1358 | vendor-advisory, x_refsource_DEBIAN | |
http://www.novell.com/linux/security/advisories/2007_15_sr.html | vendor-advisory, x_refsource_SUSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:28:52.239Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "26099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26099" }, { "name": "24950", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24950" }, { "name": "1018407", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018407" }, { "name": "GLSA-200802-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "name": "29051", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29051" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "name": "asterisk-skinny-driver-dos(35478)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35478" }, { "name": "ADV-2007-2563", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-016.pdf" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "SUSE-SR:2007:015", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The Skinny channel driver (chan_skinny) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a certain data length value in a crafted packet, which results in an \"overly large memcpy.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "26099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26099" }, { "name": "24950", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24950" }, { "name": "1018407", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018407" }, { "name": "GLSA-200802-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "name": "29051", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29051" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "name": "asterisk-skinny-driver-dos(35478)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35478" }, { "name": "ADV-2007-2563", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-016.pdf" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "SUSE-SR:2007:015", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3764", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Skinny channel driver (chan_skinny) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a certain data length value in a crafted packet, which results in an \"overly large memcpy.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "26099", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26099" }, { "name": "24950", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24950" }, { "name": "1018407", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018407" }, { "name": "GLSA-200802-11", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "name": "29051", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29051" }, { "name": "http://bugs.gentoo.org/show_bug.cgi?id=185713", "refsource": "CONFIRM", "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "name": "asterisk-skinny-driver-dos(35478)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35478" }, { "name": "ADV-2007-2563", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "name": "http://ftp.digium.com/pub/asa/ASA-2007-016.pdf", "refsource": "CONFIRM", "url": "http://ftp.digium.com/pub/asa/ASA-2007-016.pdf" }, { "name": "DSA-1358", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "SUSE-SR:2007:015", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3764", "datePublished": "2007-07-18T17:00:00", "dateReserved": "2007-07-13T00:00:00", "dateUpdated": "2024-08-07T14:28:52.239Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-2294
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2007/1534 | vdb-entry, x_refsource_VUPEN | |
http://www.securitytracker.com/id?1017955 | vdb-entry, x_refsource_SECTRACK | |
http://www.novell.com/linux/security/advisories/2007_34_asterisk.html | vendor-advisory, x_refsource_SUSE | |
http://www.osvdb.org/35369 | vdb-entry, x_refsource_OSVDB | |
http://securityreason.com/securityalert/2646 | third-party-advisory, x_refsource_SREASON | |
http://secunia.com/advisories/25582 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/33886 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/24977 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/23649 | vdb-entry, x_refsource_BID | |
http://www.debian.org/security/2007/dsa-1358 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/archive/1/466911/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.asterisk.org/files/ASA-2007-012.pdf | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:33:28.299Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2007-1534", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1534" }, { "name": "1017955", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1017955" }, { "name": "SUSE-SA:2007:034", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "35369", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/35369" }, { "name": "2646", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2646" }, { "name": "25582", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25582" }, { "name": "asterisk-interface-dos(33886)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33886" }, { "name": "24977", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24977" }, { "name": "23649", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/23649" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "20070425 ASA-2007-012: Remote Crash Vulnerability in Manager Interface", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/466911/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.asterisk.org/files/ASA-2007-012.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-04-25T00:00:00", "descriptions": [ { "lang": "en", "value": "The Manager Interface in Asterisk before 1.2.18 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (crash) by using MD5 authentication to authenticate a user that does not have a password defined in manager.conf, resulting in a NULL pointer dereference." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2007-1534", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1534" }, { "name": "1017955", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1017955" }, { "name": "SUSE-SA:2007:034", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "35369", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/35369" }, { "name": "2646", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2646" }, { "name": "25582", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25582" }, { "name": "asterisk-interface-dos(33886)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33886" }, { "name": "24977", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24977" }, { "name": "23649", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/23649" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "20070425 ASA-2007-012: Remote Crash Vulnerability in Manager Interface", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/466911/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.asterisk.org/files/ASA-2007-012.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-2294", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Manager Interface in Asterisk before 1.2.18 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (crash) by using MD5 authentication to authenticate a user that does not have a password defined in manager.conf, resulting in a NULL pointer dereference." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2007-1534", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1534" }, { "name": "1017955", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1017955" }, { "name": "SUSE-SA:2007:034", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "35369", "refsource": "OSVDB", "url": "http://www.osvdb.org/35369" }, { "name": "2646", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2646" }, { "name": "25582", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25582" }, { "name": "asterisk-interface-dos(33886)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33886" }, { "name": "24977", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24977" }, { "name": "23649", "refsource": "BID", "url": "http://www.securityfocus.com/bid/23649" }, { "name": "DSA-1358", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "20070425 ASA-2007-012: Remote Crash Vulnerability in Manager Interface", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/466911/100/0/threaded" }, { "name": "http://www.asterisk.org/files/ASA-2007-012.pdf", "refsource": "CONFIRM", "url": "http://www.asterisk.org/files/ASA-2007-012.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-2294", "datePublished": "2007-04-26T20:00:00", "dateReserved": "2007-04-26T00:00:00", "dateUpdated": "2024-08-07T13:33:28.299Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-1594
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:59:08.987Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://svn.digium.com/view/asterisk/trunk/channels/chan_sip.c?r1=58907\u0026r2=59038" }, { "name": "23093", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/23093" }, { "name": "ADV-2007-1077", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1077" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.digium.com/view.php?id=9313" }, { "name": "1017809", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1017809" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.asterisk.org/node/48338" }, { "name": "SUSE-SA:2007:034", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "20070321 Two new DoS Vulnerabilities in Asterisk Fixed", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/463434/100/0/threaded" }, { "name": "24579", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24579" }, { "name": "GLSA-200704-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200704-01.xml" }, { "name": "25582", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25582" }, { "name": "24719", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24719" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sineapps.com/news.php?rssid=1707" }, { "name": "[VOIPSEC] 20070319 Asterisk SDP DOS vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-03-19T00:00:00", "descriptions": [ { "lang": "en", "value": "The handle_response function in chan_sip.c in Asterisk before 1.2.17 and 1.4.x before 1.4.2 allows remote attackers to cause a denial of service (crash) via a SIP Response code 0 in a SIP packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://svn.digium.com/view/asterisk/trunk/channels/chan_sip.c?r1=58907\u0026r2=59038" }, { "name": "23093", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/23093" }, { "name": "ADV-2007-1077", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1077" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.digium.com/view.php?id=9313" }, { "name": "1017809", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1017809" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.asterisk.org/node/48338" }, { "name": "SUSE-SA:2007:034", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "20070321 Two new DoS Vulnerabilities in Asterisk Fixed", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/463434/100/0/threaded" }, { "name": "24579", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24579" }, { "name": "GLSA-200704-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200704-01.xml" }, { "name": "25582", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25582" }, { "name": "24719", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24719" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sineapps.com/news.php?rssid=1707" }, { "name": "[VOIPSEC] 20070319 Asterisk SDP DOS vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-1594", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The handle_response function in chan_sip.c in Asterisk before 1.2.17 and 1.4.x before 1.4.2 allows remote attackers to cause a denial of service (crash) via a SIP Response code 0 in a SIP packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://svn.digium.com/view/asterisk/trunk/channels/chan_sip.c?r1=58907\u0026r2=59038", "refsource": "MISC", "url": "http://svn.digium.com/view/asterisk/trunk/channels/chan_sip.c?r1=58907\u0026r2=59038" }, { "name": "23093", "refsource": "BID", "url": "http://www.securityfocus.com/bid/23093" }, { "name": "ADV-2007-1077", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1077" }, { "name": "http://bugs.digium.com/view.php?id=9313", "refsource": "MISC", "url": "http://bugs.digium.com/view.php?id=9313" }, { "name": "1017809", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1017809" }, { "name": "http://www.asterisk.org/node/48338", "refsource": "CONFIRM", "url": "http://www.asterisk.org/node/48338" }, { "name": "SUSE-SA:2007:034", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "20070321 Two new DoS Vulnerabilities in Asterisk Fixed", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/463434/100/0/threaded" }, { "name": "24579", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24579" }, { "name": "GLSA-200704-01", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200704-01.xml" }, { "name": "25582", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25582" }, { "name": "24719", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24719" }, { "name": "http://www.sineapps.com/news.php?rssid=1707", "refsource": "CONFIRM", "url": "http://www.sineapps.com/news.php?rssid=1707" }, { "name": "[VOIPSEC] 20070319 Asterisk SDP DOS vulnerability", "refsource": "MLIST", "url": "http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-1594", "datePublished": "2007-03-22T23:00:00", "dateReserved": "2007-03-22T00:00:00", "dateUpdated": "2024-08-07T12:59:08.987Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1332
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:17:34.472Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SUSE-SR:2008:010", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html" }, { "name": "29782", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29782" }, { "name": "GLSA-200804-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200804-13.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.digium.com/pub/security/AST-2008-003.html" }, { "name": "28310", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28310" }, { "name": "20080318 AST-2008-003: Unauthenticated calls allowed from SIP channel driver", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/489818/100/0/threaded" }, { "name": "DSA-1525", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1525" }, { "name": "29426", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29426" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.asterisk.org/node/48466" }, { "name": "FEDORA-2008-2554", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html" }, { "name": "1019629", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1019629" }, { "name": "asterisk-sip-security-bypass(41308)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41308" }, { "name": "ADV-2008-0928", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0928" }, { "name": "FEDORA-2008-2620", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html" }, { "name": "29957", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29957" }, { "name": "29456", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29456" }, { "name": "29470", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29470" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "SUSE-SR:2008:010", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html" }, { "name": "29782", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29782" }, { "name": "GLSA-200804-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200804-13.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.digium.com/pub/security/AST-2008-003.html" }, { "name": "28310", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28310" }, { "name": "20080318 AST-2008-003: Unauthenticated calls allowed from SIP channel driver", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/489818/100/0/threaded" }, { "name": "DSA-1525", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1525" }, { "name": "29426", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29426" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.asterisk.org/node/48466" }, { "name": "FEDORA-2008-2554", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html" }, { "name": "1019629", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1019629" }, { "name": "asterisk-sip-security-bypass(41308)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41308" }, { "name": "ADV-2008-0928", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0928" }, { "name": "FEDORA-2008-2620", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html" }, { "name": "29957", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29957" }, { "name": "29456", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29456" }, { "name": "29470", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29470" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1332", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SUSE-SR:2008:010", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html" }, { "name": "29782", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29782" }, { "name": "GLSA-200804-13", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200804-13.xml" }, { "name": "http://downloads.digium.com/pub/security/AST-2008-003.html", "refsource": "CONFIRM", "url": "http://downloads.digium.com/pub/security/AST-2008-003.html" }, { "name": "28310", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28310" }, { "name": "20080318 AST-2008-003: Unauthenticated calls allowed from SIP channel driver", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/489818/100/0/threaded" }, { "name": "DSA-1525", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1525" }, { "name": "29426", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29426" }, { "name": "http://www.asterisk.org/node/48466", "refsource": "CONFIRM", "url": "http://www.asterisk.org/node/48466" }, { "name": "FEDORA-2008-2554", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html" }, { "name": "1019629", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1019629" }, { "name": "asterisk-sip-security-bypass(41308)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41308" }, { "name": "ADV-2008-0928", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0928" }, { "name": "FEDORA-2008-2620", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html" }, { "name": "29957", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29957" }, { "name": "29456", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29456" }, { "name": "29470", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29470" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1332", "datePublished": "2008-03-20T00:00:00", "dateReserved": "2008-03-13T00:00:00", "dateUpdated": "2024-08-07T08:17:34.472Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-2346
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://securitytracker.com/id?1022819 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/archive/1/506257/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/36593 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/36275 | vdb-entry, x_refsource_BID | |
http://downloads.asterisk.org/pub/security/AST-2009-006.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:44:55.999Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1022819", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1022819" }, { "name": "20090903 AST-2009-006: IAX2 Call Number Resource Exhaustion", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/506257/100/0/threaded" }, { "name": "36593", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36593" }, { "name": "36275", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36275" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.asterisk.org/pub/security/AST-2009-006.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-09-03T00:00:00", "descriptions": [ { "lang": "en", "value": "The IAX2 protocol implementation in Asterisk Open Source 1.2.x before 1.2.35, 1.4.x before 1.4.26.2, 1.6.0.x before 1.6.0.15, and 1.6.1.x before 1.6.1.6; Business Edition B.x.x before B.2.5.10, C.2.x before C.2.4.3, and C.3.x before C.3.1.1; and s800i 1.3.x before 1.3.0.3 allows remote attackers to cause a denial of service (call-number exhaustion) by initiating many IAX2 message exchanges, a related issue to CVE-2008-3263." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1022819", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1022819" }, { "name": "20090903 AST-2009-006: IAX2 Call Number Resource Exhaustion", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/506257/100/0/threaded" }, { "name": "36593", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36593" }, { "name": "36275", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36275" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.asterisk.org/pub/security/AST-2009-006.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2346", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The IAX2 protocol implementation in Asterisk Open Source 1.2.x before 1.2.35, 1.4.x before 1.4.26.2, 1.6.0.x before 1.6.0.15, and 1.6.1.x before 1.6.1.6; Business Edition B.x.x before B.2.5.10, C.2.x before C.2.4.3, and C.3.x before C.3.1.1; and s800i 1.3.x before 1.3.0.3 allows remote attackers to cause a denial of service (call-number exhaustion) by initiating many IAX2 message exchanges, a related issue to CVE-2008-3263." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1022819", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1022819" }, { "name": "20090903 AST-2009-006: IAX2 Call Number Resource Exhaustion", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/506257/100/0/threaded" }, { "name": "36593", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36593" }, { "name": "36275", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36275" }, { "name": "http://downloads.asterisk.org/pub/security/AST-2009-006.html", "refsource": "CONFIRM", "url": "http://downloads.asterisk.org/pub/security/AST-2009-006.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2346", "datePublished": "2009-09-08T18:00:00", "dateReserved": "2009-07-07T00:00:00", "dateUpdated": "2024-08-07T05:44:55.999Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1390
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://securityreason.com/securityalert/3764 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/bid/28316 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/489819/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41304 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/29449 | third-party-advisory, x_refsource_SECUNIA | |
http://downloads.digium.com/pub/security/AST-2008-005.html | x_refsource_CONFIRM | |
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html | vendor-advisory, x_refsource_FEDORA | |
http://www.securitytracker.com/id?1019679 | vdb-entry, x_refsource_SECTRACK | |
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html | vendor-advisory, x_refsource_FEDORA | |
http://secunia.com/advisories/29470 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:17:34.588Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "3764", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3764" }, { "name": "28316", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28316" }, { "name": "20080318 AST-2008-005: HTTP Manager ID is predictable", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/489819/100/0/threaded" }, { "name": "asterisk-httpmanagerid-weak-security(41304)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41304" }, { "name": "29449", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29449" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.digium.com/pub/security/AST-2008-005.html" }, { "name": "FEDORA-2008-2554", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html" }, { "name": "1019679", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019679" }, { "name": "FEDORA-2008-2620", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html" }, { "name": "29470", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29470" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-18T00:00:00", "descriptions": [ { "lang": "en", "value": "The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "3764", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3764" }, { "name": "28316", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28316" }, { "name": "20080318 AST-2008-005: HTTP Manager ID is predictable", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/489819/100/0/threaded" }, { "name": "asterisk-httpmanagerid-weak-security(41304)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41304" }, { "name": "29449", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29449" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.digium.com/pub/security/AST-2008-005.html" }, { "name": "FEDORA-2008-2554", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html" }, { "name": "1019679", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019679" }, { "name": "FEDORA-2008-2620", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html" }, { "name": "29470", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29470" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1390", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "3764", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3764" }, { "name": "28316", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28316" }, { "name": "20080318 AST-2008-005: HTTP Manager ID is predictable", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/489819/100/0/threaded" }, { "name": "asterisk-httpmanagerid-weak-security(41304)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41304" }, { "name": "29449", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29449" }, { "name": "http://downloads.digium.com/pub/security/AST-2008-005.html", "refsource": "CONFIRM", "url": "http://downloads.digium.com/pub/security/AST-2008-005.html" }, { "name": "FEDORA-2008-2554", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html" }, { "name": "1019679", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019679" }, { "name": "FEDORA-2008-2620", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html" }, { "name": "29470", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29470" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1390", "datePublished": "2008-03-24T17:00:00", "dateReserved": "2008-03-18T00:00:00", "dateUpdated": "2024-08-07T08:17:34.588Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-4521
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/26601 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id?1018606 | vdb-entry, x_refsource_SECTRACK | |
http://downloads.digium.com/pub/asa/AST-2007-021.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/477729/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/26602 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/36261 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2007/2978 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/25438 | vdb-entry, x_refsource_BID | |
http://securityreason.com/securityalert/3065 | third-party-advisory, x_refsource_SREASON |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:01:09.606Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "26601", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26601" }, { "name": "1018606", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018606" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.digium.com/pub/asa/AST-2007-021.html" }, { "name": "20070824 AST-2007-021: Crash from invalid/corrupted MIME bodies when using voicemail with IMAP storage", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/477729/100/0/threaded" }, { "name": "26602", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26602" }, { "name": "asterisk-mime-body-dos(36261)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36261" }, { "name": "ADV-2007-2978", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2978" }, { "name": "25438", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25438" }, { "name": "3065", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3065" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Asterisk Open Source 1.4.5 through 1.4.11, when configured to use an IMAP voicemail storage backend, allows remote attackers to cause a denial of service via an e-mail with an \"invalid/corrupted\" MIME body, which triggers a crash when the recipient listens to voicemail." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "26601", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26601" }, { "name": "1018606", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018606" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.digium.com/pub/asa/AST-2007-021.html" }, { "name": "20070824 AST-2007-021: Crash from invalid/corrupted MIME bodies when using voicemail with IMAP storage", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/477729/100/0/threaded" }, { "name": "26602", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26602" }, { "name": "asterisk-mime-body-dos(36261)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36261" }, { "name": "ADV-2007-2978", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2978" }, { "name": "25438", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25438" }, { "name": "3065", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3065" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4521", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Asterisk Open Source 1.4.5 through 1.4.11, when configured to use an IMAP voicemail storage backend, allows remote attackers to cause a denial of service via an e-mail with an \"invalid/corrupted\" MIME body, which triggers a crash when the recipient listens to voicemail." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "26601", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26601" }, { "name": "1018606", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018606" }, { "name": "http://downloads.digium.com/pub/asa/AST-2007-021.html", "refsource": "CONFIRM", "url": "http://downloads.digium.com/pub/asa/AST-2007-021.html" }, { "name": "20070824 AST-2007-021: Crash from invalid/corrupted MIME bodies when using voicemail with IMAP storage", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/477729/100/0/threaded" }, { "name": "26602", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26602" }, { "name": "asterisk-mime-body-dos(36261)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36261" }, { "name": "ADV-2007-2978", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2978" }, { "name": "25438", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25438" }, { "name": "3065", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3065" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4521", "datePublished": "2007-08-28T01:00:00", "dateReserved": "2007-08-24T00:00:00", "dateUpdated": "2024-08-07T15:01:09.606Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-2488
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2007/1661 | vdb-entry, x_refsource_VUPEN | |
http://www.novell.com/linux/security/advisories/2007_34_asterisk.html | vendor-advisory, x_refsource_SUSE | |
http://osvdb.org/35769 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/34085 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/25582 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/25134 | third-party-advisory, x_refsource_SECUNIA | |
http://ftp.digium.com/pub/asa/ASA-2007-013.pdf | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/23824 | vdb-entry, x_refsource_BID | |
http://www.debian.org/security/2007/dsa-1358 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:42:33.558Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2007-1661", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1661" }, { "name": "SUSE-SA:2007:034", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "35769", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/35769" }, { "name": "asterisk-iax2-information-disclosure(34085)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34085" }, { "name": "25582", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25582" }, { "name": "25134", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25134" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-013.pdf" }, { "name": "23824", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/23824" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1358" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-05-04T00:00:00", "descriptions": [ { "lang": "en", "value": "The IAX2 channel driver (chan_iax2) in Asterisk before 20070504 does not properly null terminate data, which allows remote attackers to trigger loss of transmitted data, and possibly obtain sensitive information (memory contents) or cause a denial of service (application crash), by sending a frame that lacks a 0 byte." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2007-1661", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1661" }, { "name": "SUSE-SA:2007:034", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "35769", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/35769" }, { "name": "asterisk-iax2-information-disclosure(34085)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34085" }, { "name": "25582", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25582" }, { "name": "25134", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25134" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-013.pdf" }, { "name": "23824", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/23824" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1358" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-2488", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The IAX2 channel driver (chan_iax2) in Asterisk before 20070504 does not properly null terminate data, which allows remote attackers to trigger loss of transmitted data, and possibly obtain sensitive information (memory contents) or cause a denial of service (application crash), by sending a frame that lacks a 0 byte." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2007-1661", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1661" }, { "name": "SUSE-SA:2007:034", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "35769", "refsource": "OSVDB", "url": "http://osvdb.org/35769" }, { "name": "asterisk-iax2-information-disclosure(34085)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34085" }, { "name": "25582", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25582" }, { "name": "25134", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25134" }, { "name": "http://ftp.digium.com/pub/asa/ASA-2007-013.pdf", "refsource": "CONFIRM", "url": "http://ftp.digium.com/pub/asa/ASA-2007-013.pdf" }, { "name": "23824", "refsource": "BID", "url": "http://www.securityfocus.com/bid/23824" }, { "name": "DSA-1358", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1358" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-2488", "datePublished": "2007-05-07T19:00:00", "dateReserved": "2007-05-03T00:00:00", "dateUpdated": "2024-08-07T13:42:33.558Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49294
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:45.375Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-8857-hfmw-vg8f", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-8857-hfmw-vg8f" }, { "name": "https://github.com/asterisk/asterisk/commit/424be345639d75c6cb7d0bd2da5f0f407dbd0bd5", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/asterisk/asterisk/commit/424be345639d75c6cb7d0bd2da5f0f407dbd0bd5" }, { "name": "https://github.com/asterisk/asterisk/blob/master/main/manager.c#L3757", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/asterisk/asterisk/blob/master/main/manager.c#L3757" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "asterisk", "vendor": "asterisk", "versions": [ { "status": "affected", "version": "\u003c 18.20.1" }, { "status": "affected", "version": "\u003e= 19.0.0, \u003c 20.5.1" }, { "status": "affected", "version": "= 21.0.0" }, { "status": "affected", "version": "\u003c 18.9-cert6" } ] } ], "descriptions": [ { "lang": "en", "value": "Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk prior to 18.9-cert6, it is possible to read any arbitrary file even when the `live_dangerously` is not enabled. This allows arbitrary files to be read. Asterisk versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk prior to 18.9-cert6, contain a fix for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-14T19:40:46.157Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-8857-hfmw-vg8f", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-8857-hfmw-vg8f" }, { "name": "https://github.com/asterisk/asterisk/commit/424be345639d75c6cb7d0bd2da5f0f407dbd0bd5", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/commit/424be345639d75c6cb7d0bd2da5f0f407dbd0bd5" }, { "name": "https://github.com/asterisk/asterisk/blob/master/main/manager.c#L3757", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/blob/master/main/manager.c#L3757" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html" } ], "source": { "advisory": "GHSA-8857-hfmw-vg8f", "discovery": "UNKNOWN" }, "title": "Asterisk Path Traversal vulnerability" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-49294", "datePublished": "2023-12-14T19:40:46.157Z", "dateReserved": "2023-11-24T16:45:24.314Z", "dateUpdated": "2024-08-02T21:53:45.375Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37457
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:16:30.273Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-98rc-4j27-74hh", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-98rc-4j27-74hh" }, { "name": "https://github.com/asterisk/asterisk/commit/a1ca0268254374b515fa5992f01340f7717113fa", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/asterisk/asterisk/commit/a1ca0268254374b515fa5992f01340f7717113fa" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "asterisk", "vendor": "asterisk", "versions": [ { "status": "affected", "version": "\u003c= 18.20.0" }, { "status": "affected", "version": "\u003e= 19.0.0, \u003c= 20.5.0" }, { "status": "affected", "version": "= 21.0.0" }, { "status": "affected", "version": " \u003c= 18.9-cert5" } ] } ], "descriptions": [ { "lang": "en", "value": "Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk versions 18.20.0 and prior, 20.5.0 and prior, and 21.0.0; as well as ceritifed-asterisk 18.9-cert5 and prior, the \u0027update\u0027 functionality of the PJSIP_HEADER dialplan function can exceed the available buffer space for storing the new value of a header. By doing so this can overwrite memory or cause a crash. This is not externally exploitable, unless dialplan is explicitly written to update a header based on data from an outside source. If the \u0027update\u0027 functionality is not used the vulnerability does not occur. A patch is available at commit a1ca0268254374b515fa5992f01340f7717113fa." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-14T19:43:30.945Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-98rc-4j27-74hh", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-98rc-4j27-74hh" }, { "name": "https://github.com/asterisk/asterisk/commit/a1ca0268254374b515fa5992f01340f7717113fa", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/commit/a1ca0268254374b515fa5992f01340f7717113fa" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html" } ], "source": { "advisory": "GHSA-98rc-4j27-74hh", "discovery": "UNKNOWN" }, "title": "Asterisk\u0027s PJSIP_HEADER dialplan function can overwrite memory/cause crash when using \u0027update\u0027" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-37457", "datePublished": "2023-12-14T19:43:30.945Z", "dateReserved": "2023-07-06T13:01:36.996Z", "dateUpdated": "2024-08-02T17:16:30.273Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-3723
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://security-tracker.debian.org/tracker/CVE-2009-3723 | x_refsource_MISC | |
https://access.redhat.com/security/cve/cve-2009-3723 | x_refsource_MISC | |
http://downloads.asterisk.org/pub/security/AST-2009-007.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:38:30.400Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2009-3723" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://access.redhat.com/security/cve/cve-2009-3723" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://downloads.asterisk.org/pub/security/AST-2009-007.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "asterisk", "vendor": "asterisk", "versions": [ { "status": "affected", "version": "All 1.6.1 versions" } ] } ], "descriptions": [ { "lang": "en", "value": "asterisk allows calls on prohibited networks" } ], "problemTypes": [ { "descriptions": [ { "description": "calls allowed on prohibited networks in asterisk", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-29T12:42:08", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2009-3723" }, { "tags": [ "x_refsource_MISC" ], "url": "https://access.redhat.com/security/cve/cve-2009-3723" }, { "tags": [ "x_refsource_MISC" ], "url": "http://downloads.asterisk.org/pub/security/AST-2009-007.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2009-3723", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "asterisk", "version": { "version_data": [ { "version_value": "All 1.6.1 versions" } ] } } ] }, "vendor_name": "asterisk" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "asterisk allows calls on prohibited networks" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "calls allowed on prohibited networks in asterisk" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-tracker.debian.org/tracker/CVE-2009-3723", "refsource": "MISC", "url": "https://security-tracker.debian.org/tracker/CVE-2009-3723" }, { "name": "https://access.redhat.com/security/cve/cve-2009-3723", "refsource": "MISC", "url": "https://access.redhat.com/security/cve/cve-2009-3723" }, { "name": "http://downloads.asterisk.org/pub/security/AST-2009-007.html", "refsource": "MISC", "url": "http://downloads.asterisk.org/pub/security/AST-2009-007.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2009-3723", "datePublished": "2019-10-29T12:42:08", "dateReserved": "2009-10-16T00:00:00", "dateUpdated": "2024-08-07T06:38:30.400Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-3263
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:28:41.740Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-200905-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200905-01.xml" }, { "name": "30321", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/30321" }, { "name": "31194", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31194" }, { "name": "asterisk-poke-dos(43942)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43942" }, { "name": "ADV-2008-2168", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2168/references" }, { "name": "FEDORA-2008-6676", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html" }, { "name": "31178", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31178" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://downloads.securityfocus.com/vulnerabilities/exploits/30321.pl" }, { "name": "20080722 AST-2008-010: Asterisk IAX \u0027POKE\u0027 resource exhaustion", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/494675/100/0/threaded" }, { "name": "1020535", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020535" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.digium.com/pub/security/AST-2008-010.html" }, { "name": "34982", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34982" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-07-21T00:00:00", "descriptions": [ { "lang": "en", "value": "The IAX2 protocol implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (call-number exhaustion and CPU consumption) by quickly sending a large number of IAX2 (IAX) POKE requests." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-200905-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200905-01.xml" }, { "name": "30321", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/30321" }, { "name": "31194", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31194" }, { "name": "asterisk-poke-dos(43942)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43942" }, { "name": "ADV-2008-2168", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2168/references" }, { "name": "FEDORA-2008-6676", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html" }, { "name": "31178", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31178" }, { "tags": [ "x_refsource_MISC" ], "url": "http://downloads.securityfocus.com/vulnerabilities/exploits/30321.pl" }, { "name": "20080722 AST-2008-010: Asterisk IAX \u0027POKE\u0027 resource exhaustion", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/494675/100/0/threaded" }, { "name": "1020535", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020535" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.digium.com/pub/security/AST-2008-010.html" }, { "name": "34982", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34982" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-3263", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The IAX2 protocol implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (call-number exhaustion and CPU consumption) by quickly sending a large number of IAX2 (IAX) POKE requests." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-200905-01", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200905-01.xml" }, { "name": "30321", "refsource": "BID", "url": "http://www.securityfocus.com/bid/30321" }, { "name": "31194", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31194" }, { "name": "asterisk-poke-dos(43942)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43942" }, { "name": "ADV-2008-2168", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2168/references" }, { "name": "FEDORA-2008-6676", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html" }, { "name": "31178", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31178" }, { "name": "http://downloads.securityfocus.com/vulnerabilities/exploits/30321.pl", "refsource": "MISC", "url": "http://downloads.securityfocus.com/vulnerabilities/exploits/30321.pl" }, { "name": "20080722 AST-2008-010: Asterisk IAX \u0027POKE\u0027 resource exhaustion", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/494675/100/0/threaded" }, { "name": "1020535", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020535" }, { "name": "http://downloads.digium.com/pub/security/AST-2008-010.html", "refsource": "CONFIRM", "url": "http://downloads.digium.com/pub/security/AST-2008-010.html" }, { "name": "34982", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34982" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-3263", "datePublished": "2008-07-22T23:00:00", "dateReserved": "2008-07-22T00:00:00", "dateUpdated": "2024-08-07T09:28:41.740Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-3762
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/35466 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/26099 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id?1018407 | vdb-entry, x_refsource_SECTRACK | |
http://security.gentoo.org/glsa/glsa-200802-11.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/29051 | third-party-advisory, x_refsource_SECUNIA | |
http://bugs.gentoo.org/show_bug.cgi?id=185713 | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2007/2563 | vdb-entry, x_refsource_VUPEN | |
http://www.debian.org/security/2007/dsa-1358 | vendor-advisory, x_refsource_DEBIAN | |
http://www.novell.com/linux/security/advisories/2007_15_sr.html | vendor-advisory, x_refsource_SUSE | |
http://ftp.digium.com/pub/asa/ASA-2007-014.pdf | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/24949 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:28:52.292Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "asterisk-iax2channeldriver-bo(35466)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35466" }, { "name": "26099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26099" }, { "name": "1018407", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018407" }, { "name": "GLSA-200802-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "name": "29051", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29051" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "name": "ADV-2007-2563", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "SUSE-SR:2007:015", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-014.pdf" }, { "name": "24949", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24949" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to execute arbitrary code by sending a long (1) voice or (2) video RTP frame." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "asterisk-iax2channeldriver-bo(35466)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35466" }, { "name": "26099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26099" }, { "name": "1018407", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018407" }, { "name": "GLSA-200802-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "name": "29051", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29051" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "name": "ADV-2007-2563", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "SUSE-SR:2007:015", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-014.pdf" }, { "name": "24949", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24949" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3762", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to execute arbitrary code by sending a long (1) voice or (2) video RTP frame." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "asterisk-iax2channeldriver-bo(35466)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35466" }, { "name": "26099", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26099" }, { "name": "1018407", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018407" }, { "name": "GLSA-200802-11", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "name": "29051", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29051" }, { "name": "http://bugs.gentoo.org/show_bug.cgi?id=185713", "refsource": "CONFIRM", "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "name": "ADV-2007-2563", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "name": "DSA-1358", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "SUSE-SR:2007:015", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" }, { "name": "http://ftp.digium.com/pub/asa/ASA-2007-014.pdf", "refsource": "CONFIRM", "url": "http://ftp.digium.com/pub/asa/ASA-2007-014.pdf" }, { "name": "24949", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24949" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3762", "datePublished": "2007-07-18T17:00:00", "dateReserved": "2007-07-13T00:00:00", "dateUpdated": "2024-08-07T14:28:52.292Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-2293
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/23648 | vdb-entry, x_refsource_BID | |
http://www.osvdb.org/35368 | vdb-entry, x_refsource_OSVDB | |
http://www.vupen.com/english/advisories/2007/1534 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/archive/1/466883/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/archive/1/472804/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/33895 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/24977 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id?1018337 | vdb-entry, x_refsource_SECTRACK | |
http://www.securitytracker.com/id?1017951 | vdb-entry, x_refsource_SECTRACK | |
http://securityreason.com/securityalert/2645 | third-party-advisory, x_refsource_SREASON | |
http://www.asterisk.org/files/ASA-2007-010.pdf | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:33:28.390Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "23648", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/23648" }, { "name": "35368", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/35368" }, { "name": "ADV-2007-1534", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1534" }, { "name": "20070425 ASA-2007-010: Two stack buffer overflows in SIP channel\u0027s T.38 SDP parsing code", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/466883/100/0/threaded" }, { "name": "20070704 Multiple Remote unauthenticated stack overflows in Asterisk chan_sip.c", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/472804/100/0/threaded" }, { "name": "asterisk-processsdp-bo(33895)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33895" }, { "name": "24977", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24977" }, { "name": "1018337", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018337" }, { "name": "1017951", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1017951" }, { "name": "2645", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2645" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.asterisk.org/files/ASA-2007-010.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-04-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in the process_sdp function in chan_sip.c of the SIP channel T.38 SDP parser in Asterisk before 1.4.3 allow remote attackers to execute arbitrary code via a long (1) T38FaxRateManagement or (2) T38FaxUdpEC SDP parameter in an SIP message, as demonstrated using SIP INVITE." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "23648", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/23648" }, { "name": "35368", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/35368" }, { "name": "ADV-2007-1534", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1534" }, { "name": "20070425 ASA-2007-010: Two stack buffer overflows in SIP channel\u0027s T.38 SDP parsing code", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/466883/100/0/threaded" }, { "name": "20070704 Multiple Remote unauthenticated stack overflows in Asterisk chan_sip.c", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/472804/100/0/threaded" }, { "name": "asterisk-processsdp-bo(33895)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33895" }, { "name": "24977", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24977" }, { "name": "1018337", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018337" }, { "name": "1017951", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1017951" }, { "name": "2645", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2645" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.asterisk.org/files/ASA-2007-010.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-2293", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple stack-based buffer overflows in the process_sdp function in chan_sip.c of the SIP channel T.38 SDP parser in Asterisk before 1.4.3 allow remote attackers to execute arbitrary code via a long (1) T38FaxRateManagement or (2) T38FaxUdpEC SDP parameter in an SIP message, as demonstrated using SIP INVITE." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "23648", "refsource": "BID", "url": "http://www.securityfocus.com/bid/23648" }, { "name": "35368", "refsource": "OSVDB", "url": "http://www.osvdb.org/35368" }, { "name": "ADV-2007-1534", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1534" }, { "name": "20070425 ASA-2007-010: Two stack buffer overflows in SIP channel\u0027s T.38 SDP parsing code", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/466883/100/0/threaded" }, { "name": "20070704 Multiple Remote unauthenticated stack overflows in Asterisk chan_sip.c", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/472804/100/0/threaded" }, { "name": "asterisk-processsdp-bo(33895)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33895" }, { "name": "24977", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24977" }, { "name": "1018337", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018337" }, { "name": "1017951", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1017951" }, { "name": "2645", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2645" }, { "name": "http://www.asterisk.org/files/ASA-2007-010.pdf", "refsource": "CONFIRM", "url": "http://www.asterisk.org/files/ASA-2007-010.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-2293", "datePublished": "2007-04-26T20:00:00", "dateReserved": "2007-04-26T00:00:00", "dateUpdated": "2024-08-07T13:33:28.390Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-4455
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://securityreason.com/securityalert/3047 | third-party-advisory, x_refsource_SREASON | |
http://www.vupen.com/english/advisories/2007/2953 | vdb-entry, x_refsource_VUPEN | |
http://downloads.digium.com/pub/asa/AST-2007-020.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/25392 | vdb-entry, x_refsource_BID | |
http://seclists.org/fulldisclosure/2007/Aug/0393.html | mailing-list, x_refsource_FULLDISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/36145 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/26553 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id?1018595 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:53:55.958Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "3047", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3047" }, { "name": "ADV-2007-2953", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2953" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.digium.com/pub/asa/AST-2007-020.html" }, { "name": "25392", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25392" }, { "name": "20070821 AST-2007-020: Resource Exhaustion Vulnerability in Asterisk SIP channel driver", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2007/Aug/0393.html" }, { "name": "asterisk-sip-dialoghistory-dos(36145)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36145" }, { "name": "26553", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26553" }, { "name": "1018595", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018595" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-08-21T00:00:00", "descriptions": [ { "lang": "en", "value": "The SIP channel driver (chan_sip) in Asterisk Open Source 1.4.x before 1.4.11, AsteriskNOW before beta7, Asterisk Appliance Developer Kit 0.x before 0.8.0, and s800i (Asterisk Appliance) 1.x before 1.0.3 allows remote attackers to cause a denial of service (memory exhaustion) via a SIP dialog that causes a large number of history entries to be created." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "3047", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3047" }, { "name": "ADV-2007-2953", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2953" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.digium.com/pub/asa/AST-2007-020.html" }, { "name": "25392", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25392" }, { "name": "20070821 AST-2007-020: Resource Exhaustion Vulnerability in Asterisk SIP channel driver", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2007/Aug/0393.html" }, { "name": "asterisk-sip-dialoghistory-dos(36145)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36145" }, { "name": "26553", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26553" }, { "name": "1018595", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018595" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4455", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SIP channel driver (chan_sip) in Asterisk Open Source 1.4.x before 1.4.11, AsteriskNOW before beta7, Asterisk Appliance Developer Kit 0.x before 0.8.0, and s800i (Asterisk Appliance) 1.x before 1.0.3 allows remote attackers to cause a denial of service (memory exhaustion) via a SIP dialog that causes a large number of history entries to be created." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "3047", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3047" }, { "name": "ADV-2007-2953", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2953" }, { "name": "http://downloads.digium.com/pub/asa/AST-2007-020.html", "refsource": "CONFIRM", "url": "http://downloads.digium.com/pub/asa/AST-2007-020.html" }, { "name": "25392", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25392" }, { "name": "20070821 AST-2007-020: Resource Exhaustion Vulnerability in Asterisk SIP channel driver", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2007/Aug/0393.html" }, { "name": "asterisk-sip-dialoghistory-dos(36145)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36145" }, { "name": "26553", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26553" }, { "name": "1018595", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018595" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4455", "datePublished": "2007-08-22T01:00:00", "dateReserved": "2007-08-21T00:00:00", "dateUpdated": "2024-08-07T14:53:55.958Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-1561
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:59:08.721Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1017794", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1017794" }, { "name": "20070319 Asterisk SDP DOS vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://marc.info/?l=full-disclosure\u0026m=117432783011737\u0026w=2" }, { "name": "24564", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24564" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://asterisk.org/node/48339" }, { "name": "SUSE-SA:2007:034", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "20070321 Two new DoS Vulnerabilities in Asterisk Fixed", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/463434/100/0/threaded" }, { "name": "23031", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/23031" }, { "name": "asterisk-sip-invite-dos(33068)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33068" }, { "name": "GLSA-200704-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200704-01.xml" }, { "name": "25582", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25582" }, { "name": "24719", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24719" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sineapps.com/news.php?rssid=1707" }, { "name": "ADV-2007-1039", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1039" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "34479", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/34479" }, { "name": "[VOIPSEC] 20070319 Asterisk SDP DOS vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-03-19T00:00:00", "descriptions": [ { "lang": "en", "value": "The channel driver in Asterisk before 1.2.17 and 1.4.x before 1.4.2 allows remote attackers to cause a denial of service (crash) via a SIP INVITE message with an SDP containing one valid and one invalid IP address." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1017794", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1017794" }, { "name": "20070319 Asterisk SDP DOS vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://marc.info/?l=full-disclosure\u0026m=117432783011737\u0026w=2" }, { "name": "24564", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24564" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://asterisk.org/node/48339" }, { "name": "SUSE-SA:2007:034", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "20070321 Two new DoS Vulnerabilities in Asterisk Fixed", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/463434/100/0/threaded" }, { "name": "23031", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/23031" }, { "name": "asterisk-sip-invite-dos(33068)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33068" }, { "name": "GLSA-200704-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200704-01.xml" }, { "name": "25582", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25582" }, { "name": "24719", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24719" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sineapps.com/news.php?rssid=1707" }, { "name": "ADV-2007-1039", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1039" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "34479", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/34479" }, { "name": "[VOIPSEC] 20070319 Asterisk SDP DOS vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-1561", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The channel driver in Asterisk before 1.2.17 and 1.4.x before 1.4.2 allows remote attackers to cause a denial of service (crash) via a SIP INVITE message with an SDP containing one valid and one invalid IP address." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1017794", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1017794" }, { "name": "20070319 Asterisk SDP DOS vulnerability", "refsource": "FULLDISC", "url": "http://marc.info/?l=full-disclosure\u0026m=117432783011737\u0026w=2" }, { "name": "24564", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24564" }, { "name": "http://asterisk.org/node/48339", "refsource": "CONFIRM", "url": "http://asterisk.org/node/48339" }, { "name": "SUSE-SA:2007:034", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "20070321 Two new DoS Vulnerabilities in Asterisk Fixed", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/463434/100/0/threaded" }, { "name": "23031", "refsource": "BID", "url": "http://www.securityfocus.com/bid/23031" }, { "name": "asterisk-sip-invite-dos(33068)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33068" }, { "name": "GLSA-200704-01", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200704-01.xml" }, { "name": "25582", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25582" }, { "name": "24719", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24719" }, { "name": "http://www.sineapps.com/news.php?rssid=1707", "refsource": "CONFIRM", "url": "http://www.sineapps.com/news.php?rssid=1707" }, { "name": "ADV-2007-1039", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1039" }, { "name": "DSA-1358", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "34479", "refsource": "OSVDB", "url": "http://www.osvdb.org/34479" }, { "name": "[VOIPSEC] 20070319 Asterisk SDP DOS vulnerability", "refsource": "MLIST", "url": "http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-1561", "datePublished": "2007-03-21T19:00:00", "dateReserved": "2007-03-21T00:00:00", "dateUpdated": "2024-08-07T12:59:08.721Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-35190
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://github.com/asterisk/asterisk/security/advisories/GHSA-qqxj-v78h-hrf9 | x_refsource_CONFIRM | |
https://github.com/asterisk/asterisk/pull/600 | x_refsource_MISC | |
https://github.com/asterisk/asterisk/pull/602 | x_refsource_MISC | |
https://github.com/asterisk/asterisk/commit/85241bd22936cc15760fd1f65d16c98be7aeaf6d | x_refsource_MISC |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:asterisk:asterisk:21.3.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "asterisk", "vendor": "asterisk", "versions": [ { "status": "affected", "version": "21.3.0" } ] }, { "cpes": [ "cpe:2.3:a:asterisk:asterisk:20.8.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "asterisk", "vendor": "asterisk", "versions": [ { "status": "affected", "version": "20.8.0" } ] }, { "cpes": [ "cpe:2.3:a:asterisk:asterisk:18.23.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "asterisk", "vendor": "asterisk", "versions": [ { "status": "affected", "version": "18.23.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-35190", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-17T19:33:53.154042Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-24T15:28:38.260Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:07:46.821Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-qqxj-v78h-hrf9", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-qqxj-v78h-hrf9" }, { "name": "https://github.com/asterisk/asterisk/pull/600", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/asterisk/asterisk/pull/600" }, { "name": "https://github.com/asterisk/asterisk/pull/602", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/asterisk/asterisk/pull/602" }, { "name": "https://github.com/asterisk/asterisk/commit/85241bd22936cc15760fd1f65d16c98be7aeaf6d", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/asterisk/asterisk/commit/85241bd22936cc15760fd1f65d16c98be7aeaf6d" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "asterisk", "vendor": "asterisk", "versions": [ { "status": "affected", "version": "= 21.3.0" }, { "status": "affected", "version": "= 20.8.0" }, { "status": "affected", "version": "= 18.23.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Asterisk is an open source private branch exchange and telephony toolkit. After upgrade to 18.23.0, ALL unauthorized SIP requests are identified as PJSIP Endpoint of local asterisk server. This vulnerability is fixed in 18.23.1, 20.8.1, and 21.3.1.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-303", "description": "CWE-303: Incorrect Implementation of Authentication Algorithm", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-480", "description": "CWE-480: Use of Incorrect Operator", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-670", "description": "CWE-670: Always-Incorrect Control Flow Implementation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-17T16:55:41.346Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-qqxj-v78h-hrf9", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-qqxj-v78h-hrf9" }, { "name": "https://github.com/asterisk/asterisk/pull/600", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/pull/600" }, { "name": "https://github.com/asterisk/asterisk/pull/602", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/pull/602" }, { "name": "https://github.com/asterisk/asterisk/commit/85241bd22936cc15760fd1f65d16c98be7aeaf6d", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/commit/85241bd22936cc15760fd1f65d16c98be7aeaf6d" } ], "source": { "advisory": "GHSA-qqxj-v78h-hrf9", "discovery": "UNKNOWN" }, "title": "Asterisk\u0027 res_pjsip_endpoint_identifier_ip: wrongly matches ALL unauthorized SIP requests" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-35190", "datePublished": "2024-05-17T16:55:41.346Z", "dateReserved": "2024-05-10T14:24:24.341Z", "dateUpdated": "2024-08-02T03:07:46.821Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-3765
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/26099 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/24950 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id?1018407 | vdb-entry, x_refsource_SECTRACK | |
http://ftp.digium.com/pub/asa/ASA-2007-017.pdf | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35480 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2007/2563 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:28:52.295Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "26099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26099" }, { "name": "24950", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24950" }, { "name": "1018407", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018407" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-017.pdf" }, { "name": "asterisk-stun-dos(35480)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35480" }, { "name": "ADV-2007-2563", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2563" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The STUN implementation in Asterisk 1.4.x before 1.4.8, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted STUN length attribute in a STUN packet sent on an RTP port." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "26099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26099" }, { "name": "24950", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24950" }, { "name": "1018407", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018407" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-017.pdf" }, { "name": "asterisk-stun-dos(35480)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35480" }, { "name": "ADV-2007-2563", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2563" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3765", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The STUN implementation in Asterisk 1.4.x before 1.4.8, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted STUN length attribute in a STUN packet sent on an RTP port." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "26099", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26099" }, { "name": "24950", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24950" }, { "name": "1018407", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018407" }, { "name": "http://ftp.digium.com/pub/asa/ASA-2007-017.pdf", "refsource": "CONFIRM", "url": "http://ftp.digium.com/pub/asa/ASA-2007-017.pdf" }, { "name": "asterisk-stun-dos(35480)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35480" }, { "name": "ADV-2007-2563", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2563" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3765", "datePublished": "2007-07-18T17:00:00", "dateReserved": "2007-07-13T00:00:00", "dateUpdated": "2024-08-07T14:28:52.295Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-2297
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.asterisk.org/files/ASA-2007-011.pdf | x_refsource_CONFIRM | |
http://bugs.digium.com/view.php?id=9313 | x_refsource_MISC | |
http://www.novell.com/linux/security/advisories/2007_34_asterisk.html | vendor-advisory, x_refsource_SUSE | |
http://www.securitytracker.com/id?1017954 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/24359 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/466882/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/25582 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/33892 | vdb-entry, x_refsource_XF | |
http://securityreason.com/securityalert/2644 | third-party-advisory, x_refsource_SREASON | |
http://www.debian.org/security/2007/dsa-1358 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:33:28.286Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.asterisk.org/files/ASA-2007-011.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.digium.com/view.php?id=9313" }, { "name": "SUSE-SA:2007:034", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "1017954", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1017954" }, { "name": "24359", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24359" }, { "name": "20070425 ASA-2007-011: Multiple problems in SIP channel parser handling response codes", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/466882/100/0/threaded" }, { "name": "25582", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25582" }, { "name": "asterisk-sip-response-dos(33892)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33892" }, { "name": "2644", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2644" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1358" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-04-25T00:00:00", "descriptions": [ { "lang": "en", "value": "The SIP channel driver (chan_sip) in Asterisk before 1.2.18 and 1.4.x before 1.4.3 does not properly parse SIP UDP packets that do not contain a valid response code, which allows remote attackers to cause a denial of service (crash)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.asterisk.org/files/ASA-2007-011.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.digium.com/view.php?id=9313" }, { "name": "SUSE-SA:2007:034", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "1017954", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1017954" }, { "name": "24359", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24359" }, { "name": "20070425 ASA-2007-011: Multiple problems in SIP channel parser handling response codes", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/466882/100/0/threaded" }, { "name": "25582", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25582" }, { "name": "asterisk-sip-response-dos(33892)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33892" }, { "name": "2644", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2644" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1358" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-2297", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SIP channel driver (chan_sip) in Asterisk before 1.2.18 and 1.4.x before 1.4.3 does not properly parse SIP UDP packets that do not contain a valid response code, which allows remote attackers to cause a denial of service (crash)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.asterisk.org/files/ASA-2007-011.pdf", "refsource": "CONFIRM", "url": "http://www.asterisk.org/files/ASA-2007-011.pdf" }, { "name": "http://bugs.digium.com/view.php?id=9313", "refsource": "MISC", "url": "http://bugs.digium.com/view.php?id=9313" }, { "name": "SUSE-SA:2007:034", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "1017954", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1017954" }, { "name": "24359", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24359" }, { "name": "20070425 ASA-2007-011: Multiple problems in SIP channel parser handling response codes", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/466882/100/0/threaded" }, { "name": "25582", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25582" }, { "name": "asterisk-sip-response-dos(33892)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33892" }, { "name": "2644", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2644" }, { "name": "DSA-1358", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1358" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-2297", "datePublished": "2007-04-26T20:00:00", "dateReserved": "2007-04-26T00:00:00", "dateUpdated": "2024-08-07T13:33:28.286Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49786
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:01:25.997Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-hxj9-xwr8-w8pq", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-hxj9-xwr8-w8pq" }, { "name": "https://github.com/asterisk/asterisk/commit/d7d7764cb07c8a1872804321302ef93bf62cba05", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/asterisk/asterisk/commit/d7d7764cb07c8a1872804321302ef93bf62cba05" }, { "name": "https://github.com/EnableSecurity/advisories/tree/master/ES2023-01-asterisk-dtls-hello-race", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/EnableSecurity/advisories/tree/master/ES2023-01-asterisk-dtls-hello-race" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2023/12/15/7" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/176251/Asterisk-20.1.0-Denial-Of-Service.html" }, { "tags": [ "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2023/Dec/24" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-49786", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-08T14:19:55.907894Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-08T14:20:19.222Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "asterisk", "vendor": "asterisk", "versions": [ { "status": "affected", "version": "\u003c 18.20.1" }, { "status": "affected", "version": "\u003e= 19.0.0, \u003c 20.5.1" }, { "status": "affected", "version": "= 21.0.0" }, { "status": "affected", "version": "\u003c 18.9-cert6" } ] } ], "descriptions": [ { "lang": "en", "value": "Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versions 18.20.1, 20.5.1, and 21.0.1; as well as certified-asterisk prior to 18.9-cert6; Asterisk is susceptible to a DoS due to a race condition in the hello handshake phase of the DTLS protocol when handling DTLS-SRTP for media setup. This attack can be done continuously, thus denying new DTLS-SRTP encrypted calls during the attack. Abuse of this vulnerability may lead to a massive Denial of Service on vulnerable Asterisk servers for calls that rely on DTLS-SRTP. Commit d7d7764cb07c8a1872804321302ef93bf62cba05 contains a fix, which is part of versions 18.20.1, 20.5.1, 21.0.1, amd 18.9-cert6." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-703", "description": "CWE-703: Improper Check or Handling of Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-14T19:47:46.306Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-hxj9-xwr8-w8pq", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-hxj9-xwr8-w8pq" }, { "name": "https://github.com/asterisk/asterisk/commit/d7d7764cb07c8a1872804321302ef93bf62cba05", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/commit/d7d7764cb07c8a1872804321302ef93bf62cba05" }, { "name": "https://github.com/EnableSecurity/advisories/tree/master/ES2023-01-asterisk-dtls-hello-race", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/EnableSecurity/advisories/tree/master/ES2023-01-asterisk-dtls-hello-race" }, { "url": "http://www.openwall.com/lists/oss-security/2023/12/15/7" }, { "url": "http://packetstormsecurity.com/files/176251/Asterisk-20.1.0-Denial-Of-Service.html" }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/24" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html" } ], "source": { "advisory": "GHSA-hxj9-xwr8-w8pq", "discovery": "UNKNOWN" }, "title": "Asterisk susceptible to Denial of Service via DTLS Hello packets during call initiation" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-49786", "datePublished": "2023-12-14T19:47:46.306Z", "dateReserved": "2023-11-30T13:39:50.862Z", "dateUpdated": "2024-10-08T14:20:19.222Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-3763
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://ftp.digium.com/pub/asa/ASA-2007-015.pdf | x_refsource_CONFIRM | |
http://secunia.com/advisories/26099 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/24950 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id?1018407 | vdb-entry, x_refsource_SECTRACK | |
http://security.gentoo.org/glsa/glsa-200802-11.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/29051 | third-party-advisory, x_refsource_SECUNIA | |
http://bugs.gentoo.org/show_bug.cgi?id=185713 | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2007/2563 | vdb-entry, x_refsource_VUPEN | |
http://www.debian.org/security/2007/dsa-1358 | vendor-advisory, x_refsource_DEBIAN | |
http://www.novell.com/linux/security/advisories/2007_15_sr.html | vendor-advisory, x_refsource_SUSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:28:52.493Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-015.pdf" }, { "name": "26099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26099" }, { "name": "24950", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24950" }, { "name": "1018407", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018407" }, { "name": "GLSA-200802-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "name": "29051", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29051" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "name": "ADV-2007-2563", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "SUSE-SR:2007:015", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted (1) LAGRQ or (2) LAGRP frame that contains information elements of IAX frames, which results in a NULL pointer dereference when Asterisk does not properly set an associated variable." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-07-27T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-015.pdf" }, { "name": "26099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26099" }, { "name": "24950", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24950" }, { "name": "1018407", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018407" }, { "name": "GLSA-200802-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "name": "29051", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29051" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "name": "ADV-2007-2563", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "name": "DSA-1358", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "SUSE-SR:2007:015", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3763", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted (1) LAGRQ or (2) LAGRP frame that contains information elements of IAX frames, which results in a NULL pointer dereference when Asterisk does not properly set an associated variable." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://ftp.digium.com/pub/asa/ASA-2007-015.pdf", "refsource": "CONFIRM", "url": "http://ftp.digium.com/pub/asa/ASA-2007-015.pdf" }, { "name": "26099", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26099" }, { "name": "24950", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24950" }, { "name": "1018407", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018407" }, { "name": "GLSA-200802-11", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "name": "29051", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29051" }, { "name": "http://bugs.gentoo.org/show_bug.cgi?id=185713", "refsource": "CONFIRM", "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "name": "ADV-2007-2563", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2563" }, { "name": "DSA-1358", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1358" }, { "name": "SUSE-SR:2007:015", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3763", "datePublished": "2007-07-18T17:00:00", "dateReserved": "2007-07-13T00:00:00", "dateUpdated": "2024-08-07T14:28:52.493Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-4280
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2007/2808 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/26340 | third-party-advisory, x_refsource_SECUNIA | |
http://downloads.digium.com/pub/asa/ASA-2007-019.pdf | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35870 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/25228 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id?1018536 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:46:39.690Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2007-2808", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2808" }, { "name": "26340", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26340" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.digium.com/pub/asa/ASA-2007-019.pdf" }, { "name": "asterisk-skinny-channel-dos(35870)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35870" }, { "name": "25228", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25228" }, { "name": "1018536", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018536" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-08-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The Skinny channel driver (chan_skinny) in Asterisk Open Source before 1.4.10, AsteriskNOW before beta7, Appliance Developer Kit before 0.7.0, and Appliance s800i before 1.0.3 allows remote authenticated users to cause a denial of service (application crash) via a CAPABILITIES_RES_MESSAGE packet with a capabilities count larger than the capabilities_res_message array population." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2007-2808", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2808" }, { "name": "26340", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26340" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.digium.com/pub/asa/ASA-2007-019.pdf" }, { "name": "asterisk-skinny-channel-dos(35870)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35870" }, { "name": "25228", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25228" }, { "name": "1018536", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018536" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4280", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Skinny channel driver (chan_skinny) in Asterisk Open Source before 1.4.10, AsteriskNOW before beta7, Appliance Developer Kit before 0.7.0, and Appliance s800i before 1.0.3 allows remote authenticated users to cause a denial of service (application crash) via a CAPABILITIES_RES_MESSAGE packet with a capabilities count larger than the capabilities_res_message array population." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2007-2808", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2808" }, { "name": "26340", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26340" }, { "name": "http://downloads.digium.com/pub/asa/ASA-2007-019.pdf", "refsource": "CONFIRM", "url": "http://downloads.digium.com/pub/asa/ASA-2007-019.pdf" }, { "name": "asterisk-skinny-channel-dos(35870)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35870" }, { "name": "25228", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25228" }, { "name": "1018536", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018536" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4280", "datePublished": "2007-08-09T21:00:00", "dateReserved": "2007-08-09T00:00:00", "dateUpdated": "2024-08-07T14:46:39.690Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42365
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:asterisk:certified_asterisk:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "certified_asterisk", "vendor": "asterisk", "versions": [ { "lessThan": "18.9-cert11", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "20.7-cert2", "status": "affected", "version": "19.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:asterisk:asterisk:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "asterisk", "vendor": "asterisk", "versions": [ { "lessThan": "18.24.2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "20.9.2", "status": "affected", "version": "19.0.0", "versionType": "custom" }, { "lessThan": "21.4.2", "status": "affected", "version": "21.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-42365", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T16:38:45.608389Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-12T15:49:00.190Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "asterisk", "vendor": "asterisk", "versions": [ { "status": "affected", "version": "\u003c 18.24.2" }, { "status": "affected", "version": "\u003e= 19.0.0, \u003c 20.9.2" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.4.2" }, { "status": "affected", "version": "\u003c 18.9-cert11" }, { "status": "affected", "version": "\u003e= 19.0, \u003c 20.7-cert2" } ] } ], "descriptions": [ { "lang": "en", "value": "Asterisk is an open source private branch exchange (PBX) and telephony toolkit. Prior to asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2, an AMI user with `write=originate` may change all configuration files in the `/etc/asterisk/` directory. This occurs because they are able to curl remote files and write them to disk, but are also able to append to existing files using the `FILE` function inside the `SET` application. This issue may result in privilege escalation, remote code execution and/or blind server-side request forgery with arbitrary protocol. Asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2 contain a fix for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-267", "description": "CWE-267: Privilege Defined With Unsafe Actions", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-1220", "description": "CWE-1220: Insufficient Granularity of Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T16:29:07.436Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-c4cg-9275-6w44", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-c4cg-9275-6w44" }, { "name": "https://github.com/asterisk/asterisk/commit/42a2f4ccfa2c7062a15063e765916b3332e34cc4", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/commit/42a2f4ccfa2c7062a15063e765916b3332e34cc4" }, { "name": "https://github.com/asterisk/asterisk/commit/7a0090325bfa9d778a39ae5f7d0a98109e4651c8", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/commit/7a0090325bfa9d778a39ae5f7d0a98109e4651c8" }, { "name": "https://github.com/asterisk/asterisk/commit/b4063bf756272254b160b6d1bd6e9a3f8e16cc71", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/commit/b4063bf756272254b160b6d1bd6e9a3f8e16cc71" }, { "name": "https://github.com/asterisk/asterisk/commit/bbe68db10ab8a80c29db383e4dfe14f6eafaf993", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/commit/bbe68db10ab8a80c29db383e4dfe14f6eafaf993" }, { "name": "https://github.com/asterisk/asterisk/commit/faddd99f2b9408b524e5eb8a01589fe1fa282df2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/commit/faddd99f2b9408b524e5eb8a01589fe1fa282df2" }, { "name": "https://github.com/asterisk/asterisk/blob/14367caaf7241df1eceea7c45c5b261989c2c6db/main/manager.c#L6426", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/blob/14367caaf7241df1eceea7c45c5b261989c2c6db/main/manager.c#L6426" }, { "name": "https://github.com/asterisk/asterisk/blob/7d28165cb1b2d02d66e8693bd3fe23ee72fc55d8/main/manager.c#L6426", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/blob/7d28165cb1b2d02d66e8693bd3fe23ee72fc55d8/main/manager.c#L6426" } ], "source": { "advisory": "GHSA-c4cg-9275-6w44", "discovery": "UNKNOWN" }, "title": "Asterisk allows `Write=originate` as sufficient permissions for code execution / `System()` dialplan" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-42365", "datePublished": "2024-08-08T16:29:07.436Z", "dateReserved": "2024-07-30T14:01:33.923Z", "dateUpdated": "2024-08-12T15:49:00.190Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-0441
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:52:18.727Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.1.diff" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.asterisk.org/view.php?id=16517" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.asterisk.org/view.php?id=16634" }, { "name": "ADV-2010-0289", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/0289" }, { "name": "38047", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/38047" }, { "name": "39096", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/39096" }, { "name": "FEDORA-2010-3724", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037679.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.asterisk.org/view.php?id=16724" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.2.diff" }, { "name": "20100202 AST-2010-001: T.38 Remote Crash Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/509327/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.0.diff" }, { "name": "38395", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38395" }, { "name": "1023532", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023532" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.asterisk.org/pub/security/AST-2010-001.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-02-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Asterisk Open Source 1.6.0.x before 1.6.0.22, 1.6.1.x before 1.6.1.14, and 1.6.2.x before 1.6.2.2, and Business Edition C.3 before C.3.3.2, allows remote attackers to cause a denial of service (daemon crash) via an SIP T.38 negotiation with an SDP FaxMaxDatagram field that is (1) missing, (2) modified to contain a negative number, or (3) modified to contain a large number." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.1.diff" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.asterisk.org/view.php?id=16517" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.asterisk.org/view.php?id=16634" }, { "name": "ADV-2010-0289", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/0289" }, { "name": "38047", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/38047" }, { "name": "39096", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/39096" }, { "name": "FEDORA-2010-3724", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037679.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.asterisk.org/view.php?id=16724" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.2.diff" }, { "name": "20100202 AST-2010-001: T.38 Remote Crash Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/509327/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.0.diff" }, { "name": "38395", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38395" }, { "name": "1023532", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023532" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.asterisk.org/pub/security/AST-2010-001.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-0441", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Asterisk Open Source 1.6.0.x before 1.6.0.22, 1.6.1.x before 1.6.1.14, and 1.6.2.x before 1.6.2.2, and Business Edition C.3 before C.3.3.2, allows remote attackers to cause a denial of service (daemon crash) via an SIP T.38 negotiation with an SDP FaxMaxDatagram field that is (1) missing, (2) modified to contain a negative number, or (3) modified to contain a large number." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.1.diff", "refsource": "CONFIRM", "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.1.diff" }, { "name": "https://issues.asterisk.org/view.php?id=16517", "refsource": "CONFIRM", "url": "https://issues.asterisk.org/view.php?id=16517" }, { "name": "https://issues.asterisk.org/view.php?id=16634", "refsource": "CONFIRM", "url": "https://issues.asterisk.org/view.php?id=16634" }, { "name": "ADV-2010-0289", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/0289" }, { "name": "38047", "refsource": "BID", "url": "http://www.securityfocus.com/bid/38047" }, { "name": "39096", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/39096" }, { "name": "FEDORA-2010-3724", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037679.html" }, { "name": "https://issues.asterisk.org/view.php?id=16724", "refsource": "CONFIRM", "url": "https://issues.asterisk.org/view.php?id=16724" }, { "name": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.2.diff", "refsource": "CONFIRM", "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.2.diff" }, { "name": "20100202 AST-2010-001: T.38 Remote Crash Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/509327/100/0/threaded" }, { "name": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.0.diff", "refsource": "CONFIRM", "url": "http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.0.diff" }, { "name": "38395", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38395" }, { "name": "1023532", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023532" }, { "name": "http://downloads.asterisk.org/pub/security/AST-2010-001.html", "refsource": "CONFIRM", "url": "http://downloads.asterisk.org/pub/security/AST-2010-001.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-0441", "datePublished": "2010-02-04T18:00:00", "dateReserved": "2010-01-27T00:00:00", "dateUpdated": "2024-08-07T00:52:18.727Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42491
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42491", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-05T18:48:24.364960Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-05T18:52:42.844Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "asterisk", "vendor": "asterisk", "versions": [ { "status": "affected", "version": "\u003c 18.24.3" }, { "status": "affected", "version": "\u003e= 19.0.0, \u003c 20.9.3" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.4.3" }, { "status": "affected", "version": "\u003c 18.9-cert12" }, { "status": "affected", "version": "\u003e= 19.0, \u003c 20.7-cert2" } ] } ], "descriptions": [ { "lang": "en", "value": "Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.24.3, 20.9.3, and 21.4.3 of Asterisk and versions 18.9-cert12 and 20.7-cert2 of certified-asterisk, if Asterisk attempts to send a SIP request to a URI whose host portion starts with `.1` or `[.1]`, and res_resolver_unbound is loaded, Asterisk will crash with a SEGV. To receive a patch, users should upgrade to one of the following versions: 18.24.3, 20.9.3, 21.4.3, certified-18.9-cert12, certified-20.7-cert2. Two workarounds are available. Disable res_resolver_unbound by setting `noload = res_resolver_unbound.so` in modules.conf, or set `rewrite_contact = yes` on all PJSIP endpoints. NOTE: This may not be appropriate for all Asterisk configurations." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-252", "description": "CWE-252: Unchecked Return Value", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476: NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-05T17:17:56.961Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/asterisk/asterisk/security/advisories/GHSA-v428-g3cw-7hv9", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-v428-g3cw-7hv9" }, { "name": "https://github.com/asterisk/asterisk/commit/42a2f4ccfa2c7062a15063e765916b3332e34cc4", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/commit/42a2f4ccfa2c7062a15063e765916b3332e34cc4" }, { "name": "https://github.com/asterisk/asterisk/commit/4f01669c7c41c9184f3cce9a3cf1b2ebf6201742", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/commit/4f01669c7c41c9184f3cce9a3cf1b2ebf6201742" }, { "name": "https://github.com/asterisk/asterisk/commit/50bf8d4d3064930d28ecf1ce3397b14574d514d2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/commit/50bf8d4d3064930d28ecf1ce3397b14574d514d2" }, { "name": "https://github.com/asterisk/asterisk/commit/7a0090325bfa9d778a39ae5f7d0a98109e4651c8", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/commit/7a0090325bfa9d778a39ae5f7d0a98109e4651c8" }, { "name": "https://github.com/asterisk/asterisk/commit/a15050650abf09c10a3c135fab148220cd41d3a0", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/asterisk/asterisk/commit/a15050650abf09c10a3c135fab148220cd41d3a0" } ], "source": { "advisory": "GHSA-v428-g3cw-7hv9", "discovery": "UNKNOWN" }, "title": "A malformed Contact or Record-Route URI in an incoming SIP request can cause Asterisk to crash when res_resolver_unbound is used" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-42491", "datePublished": "2024-09-05T17:17:56.961Z", "dateReserved": "2024-08-02T14:13:04.619Z", "dateUpdated": "2024-09-05T18:52:42.844Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-1595
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/23155 | vdb-entry, x_refsource_BID | |
http://svn.digium.com/view/asterisk?rev=59073&view=rev | x_refsource_CONFIRM | |
http://www.novell.com/linux/security/advisories/2007_34_asterisk.html | vendor-advisory, x_refsource_SUSE | |
http://bugs.digium.com/view.php?id=9316 | x_refsource_MISC | |
http://secunia.com/advisories/25582 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/24694 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2007/1123 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:59:08.853Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "23155", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/23155" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.digium.com/view/asterisk?rev=59073\u0026view=rev" }, { "name": "SUSE-SA:2007:034", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.digium.com/view.php?id=9316" }, { "name": "25582", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25582" }, { "name": "24694", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24694" }, { "name": "ADV-2007-1123", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1123" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-03-19T00:00:00", "descriptions": [ { "lang": "en", "value": "The Asterisk Extension Language (AEL) in pbx/pbx_ael.c in Asterisk does not properly generate extensions, which allows remote attackers to execute arbitrary extensions and have an unknown impact by specifying an invalid extension in a certain form." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-04-12T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "23155", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/23155" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.digium.com/view/asterisk?rev=59073\u0026view=rev" }, { "name": "SUSE-SA:2007:034", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.digium.com/view.php?id=9316" }, { "name": "25582", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25582" }, { "name": "24694", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24694" }, { "name": "ADV-2007-1123", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1123" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-1595", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Asterisk Extension Language (AEL) in pbx/pbx_ael.c in Asterisk does not properly generate extensions, which allows remote attackers to execute arbitrary extensions and have an unknown impact by specifying an invalid extension in a certain form." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "23155", "refsource": "BID", "url": "http://www.securityfocus.com/bid/23155" }, { "name": "http://svn.digium.com/view/asterisk?rev=59073\u0026view=rev", "refsource": "CONFIRM", "url": "http://svn.digium.com/view/asterisk?rev=59073\u0026view=rev" }, { "name": "SUSE-SA:2007:034", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "name": "http://bugs.digium.com/view.php?id=9316", "refsource": "MISC", "url": "http://bugs.digium.com/view.php?id=9316" }, { "name": "25582", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25582" }, { "name": "24694", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24694" }, { "name": "ADV-2007-1123", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1123" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-1595", "datePublished": "2007-03-22T23:00:00", "dateReserved": "2007-03-22T00:00:00", "dateUpdated": "2024-08-07T12:59:08.853Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-200909-0357
Vulnerability from variot
The IAX2 protocol implementation in Asterisk Open Source 1.2.x before 1.2.35, 1.4.x before 1.4.26.2, 1.6.0.x before 1.6.0.15, and 1.6.1.x before 1.6.1.6; Business Edition B.x.x before B.2.5.10, C.2.x before C.2.4.3, and C.3.x before C.3.1.1; and s800i 1.3.x before 1.3.0.3 allows remote attackers to cause a denial of service (call-number exhaustion) by initiating many IAX2 message exchanges, a related issue to CVE-2008-3263. The problem is CVE-2008-3263 Related toBy a third party IAX2 Service operation disruption by starting message exchange ( Call number exhaustion ) There is a possibility of being put into a state. Asterisk is prone to a remote denial-of-service vulnerability because it fails to properly handle an excessive amount of call numbers. Successful exploits can cause the application to stop accepting connections, resulting in denial-of-service conditions for legitimate users.
The vulnerabilities are caused due to NULL-pointer dereference errors in the "sip_uri_params_cmp()" and "sip_uri_headers_cmp()" functions. This can be exploited to crash the application via a SIP message lacking certain headers.
Successful exploitation requires that the SIP channel driver is configured with the "pedantic" option enabled.
PROVIDED AND/OR DISCOVERED BY: The vendor credits bugs.digium.com user klaus3000. Asterisk Project Security Advisory - AST-2009-006
+------------------------------------------------------------------------+ | Product | Asterisk | |--------------------+---------------------------------------------------| | Summary | IAX2 Call Number Resource Exhaustion | |--------------------+---------------------------------------------------| | Nature of Advisory | Denial of Service | |--------------------+---------------------------------------------------| | Susceptibility | Remote unauthenticated sessions | |--------------------+---------------------------------------------------| | Severity | Major | |--------------------+---------------------------------------------------| | Exploits Known | Yes - Published by Blake Cornell < blake AT | | | remoteorigin DOT com > on voip0day.com | |--------------------+---------------------------------------------------| | Reported On | June 22, 2008 | |--------------------+---------------------------------------------------| | Reported By | Noam Rathaus < noamr AT beyondsecurity DOT com >, | | | with his SSD program, also by Blake Cornell | |--------------------+---------------------------------------------------| | Posted On | September 3, 2009 | |--------------------+---------------------------------------------------| | Last Updated On | September 3, 2009 | |--------------------+---------------------------------------------------| | Advisory Contact | Russell Bryant < russell AT digium DOT com > | |--------------------+---------------------------------------------------| | CVE Name | CVE-2009-2346 | +------------------------------------------------------------------------+
+------------------------------------------------------------------------+ | Description | The IAX2 protocol uses a call number to associate | | | messages with the call that they belong to. However, the | | | protocol defines the call number field in messages as a | | | fixed size 15 bit field. So, if all call numbers are in | | | use, no additional sessions can be handled. | | | | | | A call number gets created at the start of an IAX2 | | | message exchange. So, an attacker can send a large | | | number of messages and consume the call number space. | | | The attack is also possible using spoofed source IP | | | addresses as no handshake is required before a call | | | number is assigned. | +------------------------------------------------------------------------+
+------------------------------------------------------------------------+ | Resolution | Upgrade to a version of Asterisk listed in this document | | | as containing the IAX2 protocol security enhancements. In | | | addition to upgrading, administrators should consult the | | | users guide section of the IAX2 Security document | | | (IAX2-security.pdf), as well as the sample configuration | | | file for chan_iax2 that have been distributed with those | | | releases for assistance with new options that have been | | | provided. | +------------------------------------------------------------------------+
+------------------------------------------------------------------------+ | Discussion | A lot of time was spent trying to come up with a way to | | | resolve this issue in a way that was completely backwards | | | compatible. However, the final resolution ended up | | | requiring a modification to the IAX2 protocol. This | | | modification is referred to as call token validation. | | | Call token validation is used as a handshake before call | | | numbers are assigned to IAX2 connections. | | | | | | Call token validation by itself does not resolve the | | | issue. However, it does allow an IAX2 server to validate | | | that the source of the messages has not been spoofed. In | | | addition to call token validation, Asterisk now also has | | | the ability to limit the amount of call numbers assigned | | | to a given remote IP address. | | | | | | The combination of call token validation and call number | | | allocation limits is used to mitigate this denial of | | | service issue. | | | | | | An alternative approach to securing IAX2 would be to use | | | a security layer on top of IAX2, such as DTLS [RFC4347] | | | or IPsec [RFC4301]. All Rights Reserved. Permission is hereby granted to distribute and publish this advisory in its original, unaltered form.
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201006-20
http://security.gentoo.org/
Severity: Normal Title: Asterisk: Multiple vulnerabilities Date: June 04, 2010 Bugs: #281107, #283624, #284892, #295270 ID: 201006-20
Synopsis
Multiple vulnerabilities in Asterisk might allow remote attackers to cause a Denial of Service condition, or conduct other attacks.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-misc/asterisk < 1.2.37 >= 1.2.37
Description
Multiple vulnerabilities have been reported in Asterisk:
-
Nick Baggott reported that Asterisk does not properly process overly long ASCII strings in various packets (CVE-2009-2726).
-
Noam Rathaus and Blake Cornell reported a flaw in the IAX2 protocol implementation (CVE-2009-2346).
-
amorsen reported an input processing error in the RTP protocol implementation (CVE-2009-4055).
-
Patrik Karlsson reported an information disclosure flaw related to the REGISTER message (CVE-2009-3727).
-
A vulnerability was found in the bundled Prototype JavaScript library, related to AJAX calls (CVE-2008-7220).
Impact
A remote attacker could exploit these vulnerabilities by sending a specially crafted package, possibly causing a Denial of Service condition, or resulting in information disclosure.
Workaround
There is no known workaround at this time.
Resolution
All Asterisk users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/asterisk-1.2.37"
NOTE: This is a legacy GLSA. Updates for all affected architectures are available since January 5, 2010. It is likely that your system is already no longer affected by this issue.
References
[ 1 ] CVE-2009-2726 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2726 [ 2 ] CVE-2009-2346 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2346 [ 3 ] CVE-2009-4055 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4055 [ 4 ] CVE-2009-3727 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3727 [ 5 ] CVE-2008-7220 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7220
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201006-20.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 . ----------------------------------------------------------------------
Do you have VARM strategy implemented?
(Vulnerability Assessment Remediation Management)
If not, then implement it through the most reliable vulnerability intelligence source on the market.
Implement it through Secunia.
For more information visit: http://secunia.com/advisories/business_solutions/
Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com
TITLE: Asterisk IAX2 Call Number Exhaustion Denial of Service
SECUNIA ADVISORY ID: SA36593
VERIFY ADVISORY: http://secunia.com/advisories/36593/
DESCRIPTION: A vulnerability has been reported in Asterisk, which can be exploited by malicious people to cause a DoS (Denial of Service).
S800i (Asterisk Appliance): Update to version 1.3.0.3.
PROVIDED AND/OR DISCOVERED BY: The vendor credits: * Noam Rathaus * Blake Cornell
ORIGINAL ADVISORY: http://downloads.asterisk.org/pub/security/AST-2009-006.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
.
The vulnerabilities are caused due to "sscanf()" being invoked without specifying a maximum width e.g. when processing SIP messages. This can be exploited to exhaust stack memory in the SIP stack network thread via overly long numeric strings in various fields of a message.
NOTE: According to the vendor this is only potentially exploitable in 1.6.1 and above
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200909-0357", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "open source", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "1.2.34" }, { "model": "opensource", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "1.4.24.1" }, { "model": "opensource", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "1.4.26" }, { "model": "opensource", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "1.4.24" }, { "model": "appliance s800i", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "1.3.0.2" }, { "model": "open source", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "1.2.32" }, { "model": "open source", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "1.2.33" }, { "model": "appliance s800i", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "1.3" }, { "model": "open source", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "1.2.31" }, { "model": "opensource", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "1.4.23.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.22" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.9" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.10" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.12" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.23" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.30.4" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "1.6.1.4" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.21.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.6.0.3" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.12.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.23" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.19.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.9" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "c.1.0_beta7" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.2.2.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.14" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.13" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.26.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4beta" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.2.5.9" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.26.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.17" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "c.2.1.2.1" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.2.5.5" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.16" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "c.3.1.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.8" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.2.5.4" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "c.1.6" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.14" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.2.5.1" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "1.6.1" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.2.3.6" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.2.5.3" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.6.0.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.3" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.21" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.6.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.10.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.7" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.19" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.16.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.6.0.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.19" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.7.1" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "c.2.4.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.17" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.5" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.7" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.21.2" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.2.3.3" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.27" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.18" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.13" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.21" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.6.1.0" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.1.3.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.21.1" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.2.3.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.16" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.30" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.22.1" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "c.1.8.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.11" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.2.5.8" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.12" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.18" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.19.1" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "c.1.0_beta8" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "c.1.10.4" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "c.2.3" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.30.3" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.9.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.15" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.2.3.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.7.1" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "c.2.3.3" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.0" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "c.1.6.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.3" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "c.1.10.5" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.6" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.20" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.4" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.11" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.2.5.6" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.2" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "c.1.6.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.8" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.28" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.6.1.5" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.1.3.3" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.30.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.22.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.6" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.12.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.25" }, { "model": "opensource", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.26.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.10" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.15" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.26" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.2.3.5" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.5" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.4" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.16.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.18.1" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.2.2.1" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.2.3.4" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.0" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "c.1.10.3" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.22" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.20" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.24" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.29" }, { "model": "appliance s800i", "scope": "lt", "trust": 0.8, "vendor": "digium", "version": "1.3.x" }, { "model": "asterisk", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "business edition of b.2.5.10" }, { "model": "asterisk", "scope": "lt", "trust": 0.8, "vendor": "digium", "version": "b.x.x" }, { "model": "asterisk open source", "scope": "lt", "trust": 0.8, "vendor": "digium", "version": "1.4.x" }, { "model": "asterisk open source", "scope": "lt", "trust": 0.8, "vendor": "digium", "version": "1.6.0.x" }, { "model": "asterisk open source", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "1.6.0.15" }, { "model": "asterisk open source", "scope": "lt", "trust": 0.8, "vendor": "digium", "version": "1.2.x" }, { "model": "asterisk", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "c.2.4.3" }, { "model": "asterisk open source", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "1.4.26.2" }, { "model": "asterisk open source", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "1.2.35" }, { "model": "asterisk", "scope": "lt", "trust": 0.8, "vendor": "digium", "version": "c.2.4.3" }, { "model": "asterisk", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "c.3.1.1" }, { "model": "asterisk open source", "scope": "lt", "trust": 0.8, "vendor": "digium", "version": "1.6.1.x" }, { "model": "appliance s800i", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "1.3.0.3" }, { "model": "asterisk open source", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "1.6.1.6" }, { "model": "asterisk", "scope": "lt", "trust": 0.8, "vendor": "digium", "version": "c.3.x" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "s800i appliance", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.3.2" }, { "model": "s800i appliance", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.3" }, { "model": "business edition c.3.1.0", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.2.4.2", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.2.3.3", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.2.3", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": ".2" }, { "model": "business edition c.2.3", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.2.1.2.1", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.1.8.1", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.1.6.2", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.1.6.1", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.1.6", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.1.10.5", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.1.10.4", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.1.10.3", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.1.0-beta8", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.1.0-beta7", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.5.9", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.5.8", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.5.6", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.5.5", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.5.4", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.5.3", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.5.2", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.5.1", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.5", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.3.6", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.3.5", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.3.4", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.3.3", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.3.2", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.3.1", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.2.1", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.2.0", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.1.3.3", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.1.3.2", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "0-rc2", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.6.1" }, { "model": "0-rc1", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.6.1" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.6.1.5" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.6.1" }, { "model": "beta6", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.6" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.66" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.6.8" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.26" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.24.1" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.24" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.23.2" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.23.1" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.23" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.22" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.19.1" }, { "model": "-rc3", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.19" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.19" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.18" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.17" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.16" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.15" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.14" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.13" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.12" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.11" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.10" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.9" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.8" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.7" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.6" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.5" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.4" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.3" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.2" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.1" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.34" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.33" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.32" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.31" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.30" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.29" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.28" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.27" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.26" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.25" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.24" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.23" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.22" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.21" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.19" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.18" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.17" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.16" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.15" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.14" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.13" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.11" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.10" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.9" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.8" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.7" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.6" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.5" }, { "model": ".0-beta2", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2" }, { "model": ".0-beta1", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.6.0.3" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.6.0.14" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.6" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.26.1" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.22.1" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.21.2" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.18.1" }, { "model": "revision", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.495946" }, { "model": "beta", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.30.4" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.30.3" }, { "model": "s800i appliance", "scope": "ne", "trust": 0.3, "vendor": "asterisk", "version": "1.3.0.3" }, { "model": "business edition c.3.1", "scope": "ne", "trust": 0.3, "vendor": "asterisk", "version": "1" }, { "model": "business edition c.2.4.3", "scope": "ne", "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.5.10", "scope": "ne", "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "asterisk", "scope": "ne", "trust": 0.3, "vendor": "asterisk", "version": "1.6.1.6" }, { "model": "asterisk", "scope": "ne", "trust": 0.3, "vendor": "asterisk", "version": "1.2.35" }, { "model": "asterisk", "scope": "ne", "trust": 0.3, "vendor": "asterisk", "version": "1.6.0.15" }, { "model": "asterisk", "scope": "ne", "trust": 0.3, "vendor": "asterisk", "version": "1.4.26.2" } ], "sources": [ { "db": "BID", "id": "36275" }, { "db": "JVNDB", "id": "JVNDB-2009-003591" }, { "db": "CNNVD", "id": "CNNVD-200909-091" }, { "db": "NVD", "id": "CVE-2009-2346" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:digium:appliance_s800i", "vulnerable": true }, { "cpe22Uri": "cpe:/a:digium:asterisk", "vulnerable": true }, { "cpe22Uri": "cpe:/a:digium:open_source", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-003591" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Russell Bryant russell@digium.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200909-091" } ], "trust": 0.6 }, "cve": "CVE-2009-2346", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2009-2346", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2009-2346", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2009-2346", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200909-091", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2009-2346", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2009-2346" }, { "db": "JVNDB", "id": "JVNDB-2009-003591" }, { "db": "CNNVD", "id": "CNNVD-200909-091" }, { "db": "NVD", "id": "CVE-2009-2346" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The IAX2 protocol implementation in Asterisk Open Source 1.2.x before 1.2.35, 1.4.x before 1.4.26.2, 1.6.0.x before 1.6.0.15, and 1.6.1.x before 1.6.1.6; Business Edition B.x.x before B.2.5.10, C.2.x before C.2.4.3, and C.3.x before C.3.1.1; and s800i 1.3.x before 1.3.0.3 allows remote attackers to cause a denial of service (call-number exhaustion) by initiating many IAX2 message exchanges, a related issue to CVE-2008-3263. The problem is CVE-2008-3263 Related toBy a third party IAX2 Service operation disruption by starting message exchange ( Call number exhaustion ) There is a possibility of being put into a state. Asterisk is prone to a remote denial-of-service vulnerability because it fails to properly handle an excessive amount of call numbers. \nSuccessful exploits can cause the application to stop accepting connections, resulting in denial-of-service conditions for legitimate users. \n\nThe vulnerabilities are caused due to NULL-pointer dereference errors\nin the \"sip_uri_params_cmp()\" and \"sip_uri_headers_cmp()\" functions. \nThis can be exploited to crash the application via a SIP message\nlacking certain headers. \n\nSuccessful exploitation requires that the SIP channel driver is\nconfigured with the \"pedantic\" option enabled. \n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits bugs.digium.com user klaus3000. Asterisk Project Security Advisory - AST-2009-006\n\n +------------------------------------------------------------------------+\n | Product | Asterisk |\n |--------------------+---------------------------------------------------|\n | Summary | IAX2 Call Number Resource Exhaustion |\n |--------------------+---------------------------------------------------|\n | Nature of Advisory | Denial of Service |\n |--------------------+---------------------------------------------------|\n | Susceptibility | Remote unauthenticated sessions |\n |--------------------+---------------------------------------------------|\n | Severity | Major |\n |--------------------+---------------------------------------------------|\n | Exploits Known | Yes - Published by Blake Cornell \u003c blake AT |\n | | remoteorigin DOT com \u003e on voip0day.com |\n |--------------------+---------------------------------------------------|\n | Reported On | June 22, 2008 |\n |--------------------+---------------------------------------------------|\n | Reported By | Noam Rathaus \u003c noamr AT beyondsecurity DOT com \u003e, |\n | | with his SSD program, also by Blake Cornell |\n |--------------------+---------------------------------------------------|\n | Posted On | September 3, 2009 |\n |--------------------+---------------------------------------------------|\n | Last Updated On | September 3, 2009 |\n |--------------------+---------------------------------------------------|\n | Advisory Contact | Russell Bryant \u003c russell AT digium DOT com \u003e |\n |--------------------+---------------------------------------------------|\n | CVE Name | CVE-2009-2346 |\n +------------------------------------------------------------------------+\n\n +------------------------------------------------------------------------+\n | Description | The IAX2 protocol uses a call number to associate |\n | | messages with the call that they belong to. However, the |\n | | protocol defines the call number field in messages as a |\n | | fixed size 15 bit field. So, if all call numbers are in |\n | | use, no additional sessions can be handled. |\n | | |\n | | A call number gets created at the start of an IAX2 |\n | | message exchange. So, an attacker can send a large |\n | | number of messages and consume the call number space. |\n | | The attack is also possible using spoofed source IP |\n | | addresses as no handshake is required before a call |\n | | number is assigned. |\n +------------------------------------------------------------------------+\n\n +------------------------------------------------------------------------+\n | Resolution | Upgrade to a version of Asterisk listed in this document |\n | | as containing the IAX2 protocol security enhancements. In |\n | | addition to upgrading, administrators should consult the |\n | | users guide section of the IAX2 Security document |\n | | (IAX2-security.pdf), as well as the sample configuration |\n | | file for chan_iax2 that have been distributed with those |\n | | releases for assistance with new options that have been |\n | | provided. |\n +------------------------------------------------------------------------+\n\n +------------------------------------------------------------------------+\n | Discussion | A lot of time was spent trying to come up with a way to |\n | | resolve this issue in a way that was completely backwards |\n | | compatible. However, the final resolution ended up |\n | | requiring a modification to the IAX2 protocol. This |\n | | modification is referred to as call token validation. |\n | | Call token validation is used as a handshake before call |\n | | numbers are assigned to IAX2 connections. |\n | | |\n | | Call token validation by itself does not resolve the |\n | | issue. However, it does allow an IAX2 server to validate |\n | | that the source of the messages has not been spoofed. In |\n | | addition to call token validation, Asterisk now also has |\n | | the ability to limit the amount of call numbers assigned |\n | | to a given remote IP address. |\n | | |\n | | The combination of call token validation and call number |\n | | allocation limits is used to mitigate this denial of |\n | | service issue. |\n | | |\n | | An alternative approach to securing IAX2 would be to use |\n | | a security layer on top of IAX2, such as DTLS [RFC4347] |\n | | or IPsec [RFC4301]. All Rights Reserved. \n Permission is hereby granted to distribute and publish this advisory in its\n original, unaltered form. \n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. This fixes some\nvulnerabilities, which can be exploited by malicious people to cause\na DoS (Denial of Service). - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201006-20\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Asterisk: Multiple vulnerabilities\n Date: June 04, 2010\n Bugs: #281107, #283624, #284892, #295270\n ID: 201006-20\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities in Asterisk might allow remote attackers to\ncause a Denial of Service condition, or conduct other attacks. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-misc/asterisk \u003c 1.2.37 \u003e= 1.2.37\n\nDescription\n===========\n\nMultiple vulnerabilities have been reported in Asterisk:\n\n* Nick Baggott reported that Asterisk does not properly process\n overly long ASCII strings in various packets (CVE-2009-2726). \n\n* Noam Rathaus and Blake Cornell reported a flaw in the IAX2 protocol\n implementation (CVE-2009-2346). \n\n* amorsen reported an input processing error in the RTP protocol\n implementation (CVE-2009-4055). \n\n* Patrik Karlsson reported an information disclosure flaw related to\n the REGISTER message (CVE-2009-3727). \n\n* A vulnerability was found in the bundled Prototype JavaScript\n library, related to AJAX calls (CVE-2008-7220). \n\nImpact\n======\n\nA remote attacker could exploit these vulnerabilities by sending a\nspecially crafted package, possibly causing a Denial of Service\ncondition, or resulting in information disclosure. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Asterisk users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/asterisk-1.2.37\"\n\nNOTE: This is a legacy GLSA. Updates for all affected architectures are\navailable since January 5, 2010. It is likely that your system is\nalready no longer affected by this issue. \n\nReferences\n==========\n\n [ 1 ] CVE-2009-2726\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2726\n [ 2 ] CVE-2009-2346\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2346\n [ 3 ] CVE-2009-4055\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4055\n [ 4 ] CVE-2009-3727\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3727\n [ 5 ] CVE-2008-7220\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7220\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201006-20.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2010 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. ----------------------------------------------------------------------\n\nDo you have VARM strategy implemented?\n\n(Vulnerability Assessment Remediation Management) \n\nIf not, then implement it through the most reliable vulnerability\nintelligence source on the market. \n\nImplement it through Secunia. \n\nFor more information visit:\nhttp://secunia.com/advisories/business_solutions/\n\nAlternatively request a call from a Secunia representative today to\ndiscuss how we can help you with our capabilities contact us at:\nsales@secunia.com\n\n----------------------------------------------------------------------\n\nTITLE:\nAsterisk IAX2 Call Number Exhaustion Denial of Service\n\nSECUNIA ADVISORY ID:\nSA36593\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/36593/\n\nDESCRIPTION:\nA vulnerability has been reported in Asterisk, which can be exploited\nby malicious people to cause a DoS (Denial of Service). \n\nS800i (Asterisk Appliance):\nUpdate to version 1.3.0.3. \n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits:\n* Noam Rathaus\n* Blake Cornell\n\nORIGINAL ADVISORY:\nhttp://downloads.asterisk.org/pub/security/AST-2009-006.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n\nThe vulnerabilities are caused due to \"sscanf()\" being invoked\nwithout specifying a maximum width e.g. when processing SIP messages. \nThis can be exploited to exhaust stack memory in the SIP stack network\nthread via overly long numeric strings in various fields of a\nmessage. \n\nNOTE: According to the vendor this is only potentially exploitable in\n1.6.1 and above", "sources": [ { "db": "NVD", "id": "CVE-2009-2346" }, { "db": "JVNDB", "id": "JVNDB-2009-003591" }, { "db": "BID", "id": "36275" }, { "db": "VULMON", "id": "CVE-2009-2346" }, { "db": "PACKETSTORM", "id": "75661" }, { "db": "PACKETSTORM", "id": "80978" }, { "db": "PACKETSTORM", "id": "81677" }, { "db": "PACKETSTORM", "id": "90288" }, { "db": "PACKETSTORM", "id": "81003" }, { "db": "PACKETSTORM", "id": "80408" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2009-2346", "trust": 3.0 }, { "db": "BID", "id": "36275", "trust": 2.0 }, { "db": "SECUNIA", "id": "36593", "trust": 1.8 }, { "db": "SECTRACK", "id": "1022819", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2009-003591", "trust": 0.8 }, { "db": "BUGTRAQ", "id": "20090903 AST-2009-006: IAX2 CALL NUMBER RESOURCE EXHAUSTION", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200909-091", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2009-2346", "trust": 0.1 }, { "db": "SECUNIA", "id": "34229", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "75661", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "80978", "trust": 0.1 }, { "db": "SECUNIA", "id": "36889", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "81677", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "90288", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "81003", "trust": 0.1 }, { "db": "SECUNIA", "id": "36227", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "80408", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2009-2346" }, { "db": "BID", "id": "36275" }, { "db": "JVNDB", "id": "JVNDB-2009-003591" }, { "db": "PACKETSTORM", "id": "75661" }, { "db": "PACKETSTORM", "id": "80978" }, { "db": "PACKETSTORM", "id": "81677" }, { "db": "PACKETSTORM", "id": "90288" }, { "db": "PACKETSTORM", "id": "81003" }, { "db": "PACKETSTORM", "id": "80408" }, { "db": "CNNVD", "id": "CNNVD-200909-091" }, { "db": "NVD", "id": "CVE-2009-2346" } ] }, "id": "VAR-200909-0357", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.19659443 }, "last_update_date": "2024-11-23T21:05:16.396000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "AST-2009-006", "trust": 0.8, "url": "http://downloads.asterisk.org/pub/security/AST-2009-006.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-003591" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-003591" }, { "db": "NVD", "id": "CVE-2009-2346" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "http://downloads.asterisk.org/pub/security/ast-2009-006.html" }, { "trust": 1.8, "url": "http://www.securityfocus.com/bid/36275" }, { "trust": 1.7, "url": "http://secunia.com/advisories/36593" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1022819" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/506257/100/0/threaded" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2346" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-2346" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/506257/100/0/threaded" }, { "trust": 0.4, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.4, "url": "http://secunia.com/advisories/business_solutions/" }, { "trust": 0.4, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.4, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.3, "url": "http://www.asterisk.org/" }, { "trust": 0.3, "url": "/archive/1/506257" }, { "trust": 0.2, "url": "http://secunia.com/advisories/34229/" }, { "trust": 0.2, "url": "http://downloads.asterisk.org/pub/security/ast-2009-006-1.2.diff.txt" }, { "trust": 0.2, "url": "http://downloads.asterisk.org/pub/security/ast-2009-006-1.4.diff.txt" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2346" }, { "trust": 0.2, "url": "http://secunia.com/advisories/36227/" }, { "trust": 0.2, "url": "http://secunia.com/advisories/36593/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "http://downloads.digium.com/pub/security/ast-2009-002.html" }, { "trust": 0.1, "url": "http://secunia.com/advisories/try_vi/" }, { "trust": 0.1, "url": "https://issues.asterisk.org/view.php?id=12912" }, { "trust": 0.1, "url": "http://downloads.digium.com/pub/security/ast-2009-006.html" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2009-006-1.6.0.diff.txt|1.6.0" }, { "trust": 0.1, "url": "http://www.beyondsecurity.com/ssd.html" }, { "trust": 0.1, "url": "http://www.rfc-editor.org/authors/rfc5456.txt" }, { "trust": 0.1, "url": "http://www.asterisk.org/security" }, { "trust": 0.1, "url": "http://secunia.com/" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2009-006-1.6.1.diff.txt|1.6.1" }, { "trust": 0.1, "url": "http://downloads.digium.com/pub/security/ast-2009-006.pdf" }, { "trust": 0.1, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.1, "url": "http://secunia.com/advisories/36889/" }, { "trust": 0.1, "url": "https://www.redhat.com/archives/fedora-package-announce/2009-september/msg00783.html" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4055" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3727" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3727" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201006-20.xml" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4055" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-7220" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-7220" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2726" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2726" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2009-006-1.6.0.diff.txt" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2009-006-1.6.1.diff.txt" }, { "trust": 0.1, "url": "http://downloads.digium.com/pub/security/ast-2009-005-1.4.diff.txt" }, { "trust": 0.1, "url": "http://downloads.digium.com/pub/security/ast-2009-005-1.6.0.diff.txt" }, { "trust": 0.1, "url": "http://downloads.digium.com/pub/security/ast-2009-005-1.6.2.diff.txt" }, { "trust": 0.1, "url": "http://labs.mudynamics.com/advisories/mu-200908-01.txt" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2009-005.html" }, { "trust": 0.1, "url": "http://downloads.digium.com/pub/security/ast-2009-005-1.6.1.diff.txt" }, { "trust": 0.1, "url": "http://downloads.digium.com/pub/security/ast-2009-005-1.2.diff.txt" }, { "trust": 0.1, "url": "http://downloads.digium.com/pub/security/ast-2009-005-trunk.diff.txt" } ], "sources": [ { "db": "VULMON", "id": "CVE-2009-2346" }, { "db": "BID", "id": "36275" }, { "db": "JVNDB", "id": "JVNDB-2009-003591" }, { "db": "PACKETSTORM", "id": "75661" }, { "db": "PACKETSTORM", "id": "80978" }, { "db": "PACKETSTORM", "id": "81677" }, { "db": "PACKETSTORM", "id": "90288" }, { "db": "PACKETSTORM", "id": "81003" }, { "db": "PACKETSTORM", "id": "80408" }, { "db": "CNNVD", "id": "CNNVD-200909-091" }, { "db": "NVD", "id": "CVE-2009-2346" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2009-2346" }, { "db": "BID", "id": "36275" }, { "db": "JVNDB", "id": "JVNDB-2009-003591" }, { "db": "PACKETSTORM", "id": "75661" }, { "db": "PACKETSTORM", "id": "80978" }, { "db": "PACKETSTORM", "id": "81677" }, { "db": "PACKETSTORM", "id": "90288" }, { "db": "PACKETSTORM", "id": "81003" }, { "db": "PACKETSTORM", "id": "80408" }, { "db": "CNNVD", "id": "CNNVD-200909-091" }, { "db": "NVD", "id": "CVE-2009-2346" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2009-09-08T00:00:00", "db": "VULMON", "id": "CVE-2009-2346" }, { "date": "2009-09-03T00:00:00", "db": "BID", "id": "36275" }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2009-003591" }, { "date": "2009-03-11T08:30:33", "db": "PACKETSTORM", "id": "75661" }, { "date": "2009-09-04T01:28:46", "db": "PACKETSTORM", "id": "80978" }, { "date": "2009-09-28T05:54:05", "db": "PACKETSTORM", "id": "81677" }, { "date": "2010-06-04T05:34:39", "db": "PACKETSTORM", "id": "90288" }, { "date": "2009-09-04T15:24:50", "db": "PACKETSTORM", "id": "81003" }, { "date": "2009-08-17T09:58:53", "db": "PACKETSTORM", "id": "80408" }, { "date": "2009-09-08T00:00:00", "db": "CNNVD", "id": "CNNVD-200909-091" }, { "date": "2009-09-08T18:30:00.203000", "db": "NVD", "id": "CVE-2009-2346" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-10T00:00:00", "db": "VULMON", "id": "CVE-2009-2346" }, { "date": "2015-04-13T22:21:00", "db": "BID", "id": "36275" }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2009-003591" }, { "date": "2009-09-09T00:00:00", "db": "CNNVD", "id": "CNNVD-200909-091" }, { "date": "2024-11-21T01:04:39.463000", "db": "NVD", "id": "CVE-2009-2346" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "90288" }, { "db": "CNNVD", "id": "CNNVD-200909-091" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Asterisk Open Source of IAX2 Service disruption in protocol implementation (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-003591" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-200909-091" } ], "trust": 0.6 } }
var-201206-0140
Vulnerability from variot
chan_skinny.c in the Skinny (aka SCCP) channel driver in Certified Asterisk 1.8.11-cert before 1.8.11-cert2 and Asterisk Open Source 1.8.x before 1.8.12.1 and 10.x before 10.4.1 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by closing a connection in off-hook mode. Asterisk is prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to trigger a NULL-pointer dereference and cause a system crash, denying service to legitimate users. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201206-05
http://security.gentoo.org/
Severity: Normal Title: Asterisk: Multiple vulnerabilities Date: June 21, 2012 Bugs: #413353, #418189, #418191 ID: 201206-05
Synopsis
Multiple vulnerabilities in Asterisk might allow remote attackers to execute arbitrary code.
Background
Asterisk is an open source telephony engine and toolkit.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-misc/asterisk < 1.8.12.1 >= 1.8.12.1
Description
Multiple vulnerabilities have been found in Asterisk:
- An error in manager.c allows shell access through the MixMonitor application, GetVar, or Status (CVE-2012-2414).
- An error in chan_skinny.c could cause a heap-based buffer overflow (CVE-2012-2415).
- An error in chan_sip.c prevents Asterisk from checking if a channel exists before connected line updates (CVE-2012-2416).
- An error in chan_iax2.c may cause an invalid pointer to be called (CVE-2012-2947).
- chan_skinny.c contains a NULL pointer dereference (CVE-2012-2948).
Impact
A remote attacker could execute arbitrary code with the privileges of the process or cause a Denial of Service condition.
Workaround
There is no known workaround at this time.
Resolution
All Asterisk users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/asterisk-1.8.12.1"
References
[ 1 ] CVE-2012-2414 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2414 [ 2 ] CVE-2012-2415 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2415 [ 3 ] CVE-2012-2416 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2416 [ 4 ] CVE-2012-2947 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2947 [ 5 ] CVE-2012-2948 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2948
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201206-05.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2012 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. When an SCCP client
closes its connection to the server, a pointer in a
structure is set to Null. If the client was not in the
on-hook state at the time the connection was closed, this
pointer is later dereferenced. "Off hook") to crash
the server. Successful exploitation of this vulnerability
would result in termination of the server, causing denial
of service to legitimate users."
Resolution The pointer to the device in the structure is now checked
before it is dereferenced in the channel event callbacks and
message handling functions.
Affected Versions
Product Release Series
Asterisk Open Source 1.8.x All Versions
Asterisk Open Source 10.x All Versions
Certified Asterisk 1.8.11-cert 1.8.11-cert1
Corrected In
Product Release
Asterisk Open Source 1.8.12.1, 10.4.1
Certified Asterisk 1.8.11-cert2
Patches
SVN URL Revision
http://downloads.asterisk.org/pub/security/AST-2012-008-1.8.diff v1.8
http://downloads.asterisk.org/pub/security/AST-2012-008-10.diff v10
http://downloads.asterisk.org/pub/security/AST-2012-008-1.8.11-cert.diff v1.8.11-cert
Links https://issues.asterisk.org/jira/browse/ASTERISK-19905
Asterisk Project Security Advisories are posted at
http://www.asterisk.org/security
This document may be superseded by later versions; if so, the latest
version will be posted at
http://downloads.digium.com/pub/security/AST-2012-008.pdf and
http://downloads.digium.com/pub/security/AST-2012-008.html
Revision History
Date Editor Revisions Made
05/25/2012 Matt Jordan Initial Release
Asterisk Project Security Advisory - AST-2012-008
Copyright (c) 2012 Digium, Inc. All Rights Reserved.
Permission is hereby granted to distribute and publish this advisory in its original, unaltered form.
Full-Disclosure - We believe in it.
In addition, it was discovered that Asterisk does not set the alwaysauthreject option by default in the SIP channel driver. This allows remote attackers to observe a difference in response behavior and check for the presence of account names. (CVE-2011-2666) System administrators concerned by this user enumerating vulnerability should enable the alwaysauthreject option in the configuration. We do not plan to change the default setting in the stable version (Asterisk 1.6) in order to preserve backwards compatibility.
For the testing distribution (wheezy) and the unstable distribution (sid), this problem has been fixed in version 1:1.8.13.0~dfsg-1.
We recommend that you upgrade your asterisk packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux)
iQEcBAEBAgAGBQJP15u9AAoJEL97/wQC1SS+Pu0H/0ZPFRSNpL+hJKd7b5FGF6al BZSp51eAC0d2mEFWMml4DAvx6u1gMPzrO9PPNgsEc6gxNyD4Stj+rF54h6X5i5NR ZSlyeQTQ292J18+LdANYWwxQJyzNNthNmYL/2AiR6z2BRnD3ZqHiPbWGv0FV4Vyw rT8fZ7ujp7CQlFGwcqjPxUzBqEq5U2raN2K9BoP6zpu8mHf9WzcmL4KZR/wJxMkf 04McrMttF++gM3atFSSXCWC5Bpj8q0xpr3YIv0dI8+fWPFpevNX2MBM+diS06iNc PUWfCPTy2Psl46dC3J+JeF8TPWE/HCmV98DD54DEv0R1tPUmNm362dtfiutiBbQ= =Wy1e -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . ----------------------------------------------------------------------
Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch
TITLE: Asterisk Two Denial of Service Vulnerabilities
SECUNIA ADVISORY ID: SA49303
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49303/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49303
RELEASE DATE: 2012-05-30
DISCUSS ADVISORY: http://secunia.com/advisories/49303/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/49303/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=49303
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: Two vulnerabilities have been reported in Asterisk, which can be exploited by malicious people to cause a DoS (Denial of Service).
1) An error in IAX2 channel driver within the "handle_request_update()" function (channels/chan_sip.c) when placing an established call on hold can be exploited to cause a crash via specially crafted packets.
Successful exploitation of this vulnerability requires that the setting mohinterpret=passthrough is set and that the call is placed on hold without a suggested music-on-hold class name.
2) An error in SCCP (Skinny) channel driver (channels/chan_skinny.c) when handling termination of a client's connection can be exploited to cause a crash by closing a connection to the server in certain call states.
The vulnerabilities are reported in versions 1.8.11-cert prior to 1.8.11-cert2, 1.8.x prior to 1.8.12.1, and 10.x prior to 10.4.1.
SOLUTION: Update to a fixed version.
Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
PROVIDED AND/OR DISCOVERED BY: The vendor credits: 1) mgrobecker 2) Christoph Hebeisen
ORIGINAL ADVISORY: http://downloads.asterisk.org/pub/security/AST-2012-007.html http://downloads.asterisk.org/pub/security/AST-2012-008.html
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201206-0140", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "open source", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "10.0.0" }, { "model": "open source", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "10.1.0" }, { "model": "open source", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "10.2.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.2" }, { "model": "asterisk", "scope": "lte", "trust": 1.0, "vendor": "sangoma", "version": "10.4.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.8.0" }, { "model": "certified asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.11" }, { "model": "asterisk", "scope": "lte", "trust": 1.0, "vendor": "sangoma", "version": "1.8.12.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.6.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.11.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.7.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.9.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "10.3.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "10.4.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.5" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.10.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.3" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "10.3" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.12" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.12.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.5.0" }, { "model": "asterisk open source", "scope": "lt", "trust": 0.8, "vendor": "digium", "version": "1.8.x" }, { "model": "certified asterisk", "scope": "lt", "trust": 0.8, "vendor": "digium", "version": "1.8.11-cert" }, { "model": "certified asterisk", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "1.8.11-cert2" }, { "model": "asterisk open source", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "1.8.12.1" }, { "model": "asterisk open source", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "10.4.1" }, { "model": "asterisk open source", "scope": "lt", "trust": 0.8, "vendor": "digium", "version": "10.x" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "certified asterisk 1.8.11-cert1", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "10.0.1" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "10.0" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.82" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.42" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.41" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.24" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.1" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "10.3.1" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "10.3.0" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "10.2.1" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "10.2.0" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.7.2" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.7.1" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.4.4" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.4.3" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.3.3" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.3.1" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.2.1" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.11.1" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.11.0" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.10.1" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.10.0" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.1.2" }, { "model": "certified asterisk 1.8.11-cert2", "scope": "ne", "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "asterisk", "scope": "ne", "trust": 0.3, "vendor": "asterisk", "version": "10.4.1" }, { "model": "asterisk", "scope": "ne", "trust": 0.3, "vendor": "asterisk", "version": "1.8.12.1" } ], "sources": [ { "db": "BID", "id": "53723" }, { "db": "JVNDB", "id": "JVNDB-2012-002590" }, { "db": "CNNVD", "id": "CNNVD-201205-525" }, { "db": "NVD", "id": "CVE-2012-2948" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:digium:open_source", "vulnerable": true }, { "cpe22Uri": "cpe:/a:digium:certified_asterisk", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-002590" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Christoph Hebeisen", "sources": [ { "db": "BID", "id": "53723" }, { "db": "CNNVD", "id": "CNNVD-201205-525" } ], "trust": 0.9 }, "cve": "CVE-2012-2948", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "CVE-2012-2948", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-2948", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2012-2948", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201205-525", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-002590" }, { "db": "CNNVD", "id": "CNNVD-201205-525" }, { "db": "NVD", "id": "CVE-2012-2948" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "chan_skinny.c in the Skinny (aka SCCP) channel driver in Certified Asterisk 1.8.11-cert before 1.8.11-cert2 and Asterisk Open Source 1.8.x before 1.8.12.1 and 10.x before 10.4.1 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by closing a connection in off-hook mode. Asterisk is prone to a remote denial-of-service vulnerability. \nAttackers can exploit this issue to trigger a NULL-pointer dereference and cause a system crash, denying service to legitimate users. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201206-05\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Asterisk: Multiple vulnerabilities\n Date: June 21, 2012\n Bugs: #413353, #418189, #418191\n ID: 201206-05\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities in Asterisk might allow remote attackers to\nexecute arbitrary code. \n\nBackground\n==========\n\nAsterisk is an open source telephony engine and toolkit. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-misc/asterisk \u003c 1.8.12.1 \u003e= 1.8.12.1\n\nDescription\n===========\n\nMultiple vulnerabilities have been found in Asterisk:\n\n* An error in manager.c allows shell access through the MixMonitor\n application, GetVar, or Status (CVE-2012-2414). \n* An error in chan_skinny.c could cause a heap-based buffer overflow\n (CVE-2012-2415). \n* An error in chan_sip.c prevents Asterisk from checking if a channel\n exists before connected line updates (CVE-2012-2416). \n* An error in chan_iax2.c may cause an invalid pointer to be called\n (CVE-2012-2947). \n* chan_skinny.c contains a NULL pointer dereference (CVE-2012-2948). \n\nImpact\n======\n\nA remote attacker could execute arbitrary code with the privileges of\nthe process or cause a Denial of Service condition. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Asterisk users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/asterisk-1.8.12.1\"\n\nReferences\n==========\n\n[ 1 ] CVE-2012-2414\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2414\n[ 2 ] CVE-2012-2415\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2415\n[ 3 ] CVE-2012-2416\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2416\n[ 4 ] CVE-2012-2947\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2947\n[ 5 ] CVE-2012-2948\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2948\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201206-05.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2012 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. When an SCCP client \n closes its connection to the server, a pointer in a \n structure is set to Null. If the client was not in the \n on-hook state at the time the connection was closed, this \n pointer is later dereferenced. \"Off hook\") to crash \n the server. Successful exploitation of this vulnerability \n would result in termination of the server, causing denial \n of service to legitimate users.\" \n\n Resolution The pointer to the device in the structure is now checked \n before it is dereferenced in the channel event callbacks and \n message handling functions. \n\n Affected Versions\n Product Release Series \n Asterisk Open Source 1.8.x All Versions \n Asterisk Open Source 10.x All Versions \n Certified Asterisk 1.8.11-cert 1.8.11-cert1 \n\n Corrected In\n Product Release \n Asterisk Open Source 1.8.12.1, 10.4.1 \n Certified Asterisk 1.8.11-cert2 \n\n Patches \n SVN URL Revision \nhttp://downloads.asterisk.org/pub/security/AST-2012-008-1.8.diff v1.8 \nhttp://downloads.asterisk.org/pub/security/AST-2012-008-10.diff v10 \nhttp://downloads.asterisk.org/pub/security/AST-2012-008-1.8.11-cert.diff v1.8.11-cert \n\n Links https://issues.asterisk.org/jira/browse/ASTERISK-19905 \n\n Asterisk Project Security Advisories are posted at \n http://www.asterisk.org/security \n \n This document may be superseded by later versions; if so, the latest \n version will be posted at \n http://downloads.digium.com/pub/security/AST-2012-008.pdf and \n http://downloads.digium.com/pub/security/AST-2012-008.html \n\n Revision History\n Date Editor Revisions Made \n 05/25/2012 Matt Jordan Initial Release \n\n Asterisk Project Security Advisory - AST-2012-008\n Copyright (c) 2012 Digium, Inc. All Rights Reserved. \n Permission is hereby granted to distribute and publish this advisory in its\n original, unaltered form. \n\n_______________________________________________\nFull-Disclosure - We believe in it. \n\nIn addition, it was discovered that Asterisk does not set the\nalwaysauthreject option by default in the SIP channel driver. This\nallows remote attackers to observe a difference in response behavior\nand check for the presence of account names. (CVE-2011-2666) System\nadministrators concerned by this user enumerating vulnerability should\nenable the alwaysauthreject option in the configuration. We do not\nplan to change the default setting in the stable version\n(Asterisk 1.6) in order to preserve backwards compatibility. \n\nFor the testing distribution (wheezy) and the unstable distribution\n(sid), this problem has been fixed in version 1:1.8.13.0~dfsg-1. \n\nWe recommend that you upgrade your asterisk packages. \n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.10 (GNU/Linux)\n\niQEcBAEBAgAGBQJP15u9AAoJEL97/wQC1SS+Pu0H/0ZPFRSNpL+hJKd7b5FGF6al\nBZSp51eAC0d2mEFWMml4DAvx6u1gMPzrO9PPNgsEc6gxNyD4Stj+rF54h6X5i5NR\nZSlyeQTQ292J18+LdANYWwxQJyzNNthNmYL/2AiR6z2BRnD3ZqHiPbWGv0FV4Vyw\nrT8fZ7ujp7CQlFGwcqjPxUzBqEq5U2raN2K9BoP6zpu8mHf9WzcmL4KZR/wJxMkf\n04McrMttF++gM3atFSSXCWC5Bpj8q0xpr3YIv0dI8+fWPFpevNX2MBM+diS06iNc\nPUWfCPTy2Psl46dC3J+JeF8TPWE/HCmV98DD54DEv0R1tPUmNm362dtfiutiBbQ=\n=Wy1e\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. ----------------------------------------------------------------------\n\nBecome a PSI 3.0 beta tester!\nTest-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. \nDownload it here!\nhttp://secunia.com/psi_30_beta_launch\n\n----------------------------------------------------------------------\n\nTITLE:\nAsterisk Two Denial of Service Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA49303\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/49303/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49303\n\nRELEASE DATE:\n2012-05-30\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/49303/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/49303/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49303\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nTwo vulnerabilities have been reported in Asterisk, which can be\nexploited by malicious people to cause a DoS (Denial of Service). \n\n1) An error in IAX2 channel driver within the\n\"handle_request_update()\" function (channels/chan_sip.c) when placing\nan established call on hold can be exploited to cause a crash via\nspecially crafted packets. \n\nSuccessful exploitation of this vulnerability requires that the\nsetting mohinterpret=passthrough is set and that the call is placed\non hold without a suggested music-on-hold class name. \n\n2) An error in SCCP (Skinny) channel driver (channels/chan_skinny.c)\nwhen handling termination of a client\u0027s connection can be exploited\nto cause a crash by closing a connection to the server in certain\ncall states. \n\nThe vulnerabilities are reported in versions 1.8.11-cert prior to\n1.8.11-cert2, 1.8.x prior to 1.8.12.1, and 10.x prior to 10.4.1. \n\nSOLUTION:\nUpdate to a fixed version. \n\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits:\n1) mgrobecker\n2) Christoph Hebeisen\n\nORIGINAL ADVISORY:\nhttp://downloads.asterisk.org/pub/security/AST-2012-007.html\nhttp://downloads.asterisk.org/pub/security/AST-2012-008.html\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2012-2948" }, { "db": "JVNDB", "id": "JVNDB-2012-002590" }, { "db": "BID", "id": "53723" }, { "db": "PACKETSTORM", "id": "113979" }, { "db": "PACKETSTORM", "id": "113113" }, { "db": "PACKETSTORM", "id": "113546" }, { "db": "PACKETSTORM", "id": "113124" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-2948", "trust": 3.0 }, { "db": "BID", "id": "53723", "trust": 1.9 }, { "db": "SECUNIA", "id": "49303", "trust": 1.7 }, { "db": "SECTRACK", "id": "1027103", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2012-002590", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201205-525", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "113979", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "113113", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "113546", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "113124", "trust": 0.1 } ], "sources": [ { "db": "BID", "id": "53723" }, { "db": "JVNDB", "id": "JVNDB-2012-002590" }, { "db": "PACKETSTORM", "id": "113979" }, { "db": "PACKETSTORM", "id": "113113" }, { "db": "PACKETSTORM", "id": "113546" }, { "db": "PACKETSTORM", "id": "113124" }, { "db": "CNNVD", "id": "CNNVD-201205-525" }, { "db": "NVD", "id": "CVE-2012-2948" } ] }, "id": "VAR-201206-0140", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.348297215 }, "last_update_date": "2024-11-23T21:02:58.171000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "AST-2012-008", "trust": 0.8, "url": "http://downloads.asterisk.org/pub/security/AST-2012-008.html" }, { "title": "DSA-2493", "trust": 0.8, "url": "http://www.debian.org/security/2012/dsa-2493" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-002590" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-002590" }, { "db": "NVD", "id": "CVE-2012-2948" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://downloads.asterisk.org/pub/security/ast-2012-008.html" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/53723" }, { "trust": 1.6, "url": "http://secunia.com/advisories/49303" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75937" }, { "trust": 1.0, "url": "http://archives.neohapsis.com/archives/bugtraq/2012-05/0145.html" }, { "trust": 1.0, "url": "http://www.debian.org/security/2012/dsa-2493" }, { "trust": 1.0, "url": "http://www.securitytracker.com/id?1027103" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2948" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-2948" }, { "trust": 0.3, "url": "http://www.asterisk.org/" }, { "trust": 0.3, "url": "http://downloads.asterisk.org/pub/security/ast-2012-008.pdf" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2948" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2947" }, { "trust": 0.2, "url": "http://secunia.com/" }, { "trust": 0.2, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2948" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2415" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2415" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201206-05.xml" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2414" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2416" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2947" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2414" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2416" }, { "trust": 0.1, "url": "http://www.asterisk.org/security" }, { "trust": 0.1, "url": "https://issues.asterisk.org/jira/browse/asterisk-19905" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2012-008-1.8.diff" }, { "trust": 0.1, "url": "http://downloads.digium.com/pub/security/ast-2012-008.html" }, { "trust": 0.1, "url": "http://downloads.digium.com/pub/security/ast-2012-008.pdf" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2012-008-10.diff" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2012-008-1.8.11-cert.diff" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49303" }, { "trust": 0.1, "url": "http://secunia.com/advisories/49303/" }, { "trust": 0.1, "url": "http://secunia.com/psi_30_beta_launch" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2012-007.html" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/49303/#comments" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" } ], "sources": [ { "db": "BID", "id": "53723" }, { "db": "JVNDB", "id": "JVNDB-2012-002590" }, { "db": "PACKETSTORM", "id": "113979" }, { "db": "PACKETSTORM", "id": "113113" }, { "db": "PACKETSTORM", "id": "113546" }, { "db": "PACKETSTORM", "id": "113124" }, { "db": "CNNVD", "id": "CNNVD-201205-525" }, { "db": "NVD", "id": "CVE-2012-2948" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "53723" }, { "db": "JVNDB", "id": "JVNDB-2012-002590" }, { "db": "PACKETSTORM", "id": "113979" }, { "db": "PACKETSTORM", "id": "113113" }, { "db": "PACKETSTORM", "id": "113546" }, { "db": "PACKETSTORM", "id": "113124" }, { "db": "CNNVD", "id": "CNNVD-201205-525" }, { "db": "NVD", "id": "CVE-2012-2948" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-05-29T00:00:00", "db": "BID", "id": "53723" }, { "date": "2012-06-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-002590" }, { "date": "2012-06-21T04:39:39", "db": "PACKETSTORM", "id": "113979" }, { "date": "2012-05-29T23:38:21", "db": "PACKETSTORM", "id": "113113" }, { "date": "2012-06-12T20:50:36", "db": "PACKETSTORM", "id": "113546" }, { "date": "2012-05-30T03:42:47", "db": "PACKETSTORM", "id": "113124" }, { "date": "2012-05-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201205-525" }, { "date": "2012-06-02T15:55:01.027000", "db": "NVD", "id": "CVE-2012-2948" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-06-22T00:10:00", "db": "BID", "id": "53723" }, { "date": "2012-06-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-002590" }, { "date": "2012-06-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201205-525" }, { "date": "2024-11-21T01:40:00.380000", "db": "NVD", "id": "CVE-2012-2948" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "113979" }, { "db": "PACKETSTORM", "id": "113113" }, { "db": "CNNVD", "id": "CNNVD-201205-525" } ], "trust": 0.8 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Certified Asterisk and Asterisk Open Source Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-002590" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201205-525" } ], "trust": 0.6 } }