fkie_cve-2008-1923
Vulnerability from fkie_nvd
Published
2008-04-23 16:05
Modified
2024-11-21 00:45
Severity ?
Summary
The IAX2 channel driver (chan_iax2) in Asterisk 1.2 before revision 72630 and 1.4 before revision 65679, when configured to allow unauthenticated calls, sends "early audio" to an unverified source IP address of a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed NEW message.
Impacted products
Vendor Product Version
asterisk asterisk_appliance_developer_kit *
asterisk asterisk_business_edition *
asterisk asterisk_business_edition *
asterisk asterisk_business_edition a
asterisk asterisk_business_edition b.1.3.2
asterisk asterisk_business_edition b.1.3.3
asterisk asterisk_business_edition b.2.2.0
asterisk asterisk_business_edition b.2.2.1
asterisk asterisk_business_edition b.2.3.1
asterisk asterisk_business_edition b.2.3.2
asterisk asterisk_business_edition b.2.3.3
asterisk asterisk_business_edition b.2.3.4
asterisk asterisk_business_edition b.2.5.0
asterisk asterisk_business_edition c.1.0-beta7
asterisk asterisk_business_edition c.1.0-beta8
asterisk asterisk_business_edition c.1.0beta7
asterisk asterisk_business_edition c.1.6.1
asterisk asterisknow *
asterisk asterisknow 1.0
asterisk asterisknow 1.0.1
asterisk open_source 1.0
asterisk open_source 1.0.0
asterisk open_source 1.0.1
asterisk open_source 1.0.2
asterisk open_source 1.0.3
asterisk open_source 1.0.4
asterisk open_source 1.0.5
asterisk open_source 1.0.6
asterisk open_source 1.0.7
asterisk open_source 1.0.8
asterisk open_source 1.0.9
asterisk open_source 1.0.11
asterisk open_source 1.0.11.1
asterisk open_source 1.0.12
asterisk open_source 1.2.0
asterisk open_source 1.2.1
asterisk open_source 1.2.2
asterisk open_source 1.2.3
asterisk open_source 1.2.3
asterisk open_source 1.2.4
asterisk open_source 1.2.4
asterisk open_source 1.2.5
asterisk open_source 1.2.5
asterisk open_source 1.2.6
asterisk open_source 1.2.6
asterisk open_source 1.2.7
asterisk open_source 1.2.7
asterisk open_source 1.2.7.1
asterisk open_source 1.2.7.1
asterisk open_source 1.2.8
asterisk open_source 1.2.8
asterisk open_source 1.2.9
asterisk open_source 1.2.9.1
asterisk open_source 1.2.9.1
asterisk open_source 1.2.10
asterisk open_source 1.2.10
asterisk open_source 1.2.11
asterisk open_source 1.2.11
asterisk open_source 1.2.12
asterisk open_source 1.2.12
asterisk open_source 1.2.12.1
asterisk open_source 1.2.13
asterisk open_source 1.2.13
asterisk open_source 1.2.14
asterisk open_source 1.2.14
asterisk open_source 1.2.15
asterisk open_source 1.2.15
asterisk open_source 1.2.16
asterisk open_source 1.2.16
asterisk open_source 1.2.17
asterisk open_source 1.2.17
asterisk open_source 1.2.18
asterisk open_source 1.2.18
asterisk open_source 1.2.19
asterisk open_source 1.2.19
asterisk open_source 1.2.20
asterisk open_source 1.2.20
asterisk open_source 1.2.21
asterisk open_source 1.2.21
asterisk open_source 1.2.21.1
asterisk open_source 1.2.21.1
asterisk open_source 1.2.22
asterisk open_source 1.2.22
asterisk open_source 1.2.23
asterisk open_source 1.2.23
asterisk open_source 1.2.24
asterisk open_source 1.2.24
asterisk open_source 1.2.25
asterisk open_source 1.2.25
asterisk open_source 1.2.26
asterisk open_source 1.2.26
asterisk open_source 1.2.26.1
asterisk open_source 1.2.26.1
asterisk open_source 1.2.26.2
asterisk open_source 1.2.26.2
asterisk open_source 1.2.27
asterisk open_source 1.2.28
asterisk open_source 1.4.0
asterisk open_source 1.4.0
asterisk open_source 1.4.0
asterisk open_source 1.4.0
asterisk open_source 1.4.1
asterisk open_source 1.4.2
asterisk open_source 1.4.3
asterisk open_source 1.4.4
asterisk open_source 1.4.5
asterisk open_source 1.4.6
asterisk open_source 1.4.7
asterisk open_source 1.4.7.1
asterisk open_source 1.4.8
asterisk open_source 1.4.9
asterisk open_source 1.4.10
asterisk open_source 1.4.10.1
asterisk open_source 1.4.11
asterisk open_source 1.4.12
asterisk open_source 1.4.12.1
asterisk open_source 1.4.13
asterisk open_source 1.4.14
asterisk open_source 1.4.15
asterisk open_source 1.4.16
asterisk open_source 1.4.16.1
asterisk open_source 1.4.16.2
asterisk open_source 1.4.17
asterisk open_source 1.4.18
asterisk open_source 1.4.18.1
asterisk open_source 1.4.19
asterisk open_source 1.4.19
asterisk open_source 1.4.19
asterisk open_source 1.4.19
asterisk s800i *
asterisk s800i 1.0
asterisk s800i 1.0.1
asterisk s800i 1.0.2
asterisk s800i 1.0.3
asterisk s800i 1.0.3.3
asterisk s800i 1.1.0
asterisk s800i 1.1.0.1



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2140AF01-7079-4433-AF28-45E767E59AD6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C58BA442-8E36-492B-9700-B20B469190F4",
                     versionEndIncluding: "b2.5.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "267F32ED-B9E4-4454-99C1-F445E52EE96F",
                     versionEndIncluding: "c1.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:asterisk_business_edition:a:*:*:*:*:*:*:*",
                     matchCriteriaId: "313B3A38-8DEA-4D62-A1A4-0B6011E81870",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "802F8680-AB38-41AF-BFC8-F6927F6B1626",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCAE8D90-B032-4C60-B487-BE655D00FFAE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB64A872-B7B8-46A8-81E4-49EDAC160531",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "21000270-C9B9-430C-A252-763887A15835",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "12F7CF45-5482-4947-8F1D-48C746987475",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B64995D-7892-49AB-A89D-A5D15615C5D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "0397DBD4-EA00-444A-9008-4932F99DF325",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FCD865F-BC39-4255-A797-6E5945773337",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4956871-4DD3-4299-8BEB-9D98A4449A42",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta7:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BC80EBD-14D3-44A6-A06F-0549722E0EFA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta8:*:*:*:*:*:*:*",
                     matchCriteriaId: "7859797F-E9AD-4429-BD2C-A24EC24A5D03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0beta7:*:*:*:*:*:*:*",
                     matchCriteriaId: "34FAE6AC-1C98-42E0-A5D4-5EA17ED325A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "00A6DAD0-D4C3-4A58-A35A-991E04B50EC8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:asterisknow:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "272DE03B-1470-45FF-A31B-2CE44A8E8378",
                     versionEndIncluding: "1.0.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:asterisknow:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC6FE17C-3B08-4675-9F73-5DC0C2438BB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:asterisknow:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D8AB81C-3DCF-42E9-8022-2F7135022C73",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "678DB154-4363-42FF-8B28-367923FC6595",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8F2C378-FF0E-4765-9F66-625C4064D5CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A55A9295-F632-4856-90A1-38371EB98589",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FAE6AF1-884D-41F7-B174-9E13C7719C99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCA9E35B-9A6B-42F2-9315-9C7D09F62227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDF7EC20-A424-45E5-B7E4-3CC86075858C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "C790E105-55C8-4CDC-9FA8-E1FF6F130A67",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.0.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "44C860EF-2B29-4995-B942-000CC43FDD14",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "1ADB80EF-C724-44BA-88FC-24087799D0C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.0.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "78B39BE8-7E2D-42DF-8633-44CAD5662777",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.0.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "F39036E3-0027-4C72-9DEB-9A6E2B4512C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.0.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "A037E6F9-3EF7-4EEB-AC16-081421BCE40D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.0.11.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A7EC02A-9C9E-4589-BBB3-1908D3078A7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.0.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C70FA9C-6F3B-4BDF-97FB-81D06AB0EE65",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F7971E1-F136-4ADC-95EC-BC4F92E838CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "27202966-2C41-4964-9497-1887D2A834C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1471B5A2-15BE-4E7C-BA49-2E6002F7C8EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "7108D72F-5AFD-4EEF-B2A9-CA4FA792E193",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.3:netsec:*:*:*:*:*:*",
                     matchCriteriaId: "DC7EB4CD-6436-4E0B-A620-9DF2AC8A3C66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "107DA2D8-FE7C-4B70-856D-43D58B988694",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.4:netsec:*:*:*:*:*:*",
                     matchCriteriaId: "02D5E6DF-7C9C-479F-986B-D5C8A144ACB8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "ABD71DD9-8A15-45E2-9FB3-F0544D7E1B80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.5:netsec:*:*:*:*:*:*",
                     matchCriteriaId: "68AF6200-1385-449F-A00E-2BACEE16450B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C14614F-4E27-40A6-9E56-2B1DBB10330B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.6:netsec:*:*:*:*:*:*",
                     matchCriteriaId: "61C0769F-6739-41D2-ADD8-924AC04C5F28",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A2F2F5A-66FD-4057-917C-66332A88D83E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.7:netsec:*:*:*:*:*:*",
                     matchCriteriaId: "8EF13987-5767-4FED-9584-63D74B0A30A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "399B0206-B48B-46EF-8CA6-A6E5A2550B25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.7.1:netsec:*:*:*:*:*:*",
                     matchCriteriaId: "C57C1324-E11A-4B2B-9722-A4A63AEF0497",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "26E9760F-C0EB-47BB-8DA4-CC7815099DAF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.8:netsec:*:*:*:*:*:*",
                     matchCriteriaId: "EE6D9718-D57D-48F6-A2B1-CECAFFCDDFB8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C510A9A-C3E2-4AF8-9919-1A22E918CDEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BD915CD-A7D3-4305-A6C0-290C648A226C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.9.1:netsec:*:*:*:*:*:*",
                     matchCriteriaId: "3249AB40-2058-42E9-9A33-64E434E5BB64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E79CCE5-C29B-4726-8D2F-BC20F70959BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.10:netsec:*:*:*:*:*:*",
                     matchCriteriaId: "0CF6584D-A7BB-4BD5-8232-9293FEE4A971",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "F29C13DB-6F04-4B41-90A2-2408D70F3641",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.11:netsec:*:*:*:*:*:*",
                     matchCriteriaId: "174D6B56-7D0F-46F0-849A-FD05CB348FAC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F4F734E-0E78-4957-B323-8E9FBA7FF15C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.12:netsec:*:*:*:*:*:*",
                     matchCriteriaId: "938F545A-F8A7-455E-8E5A-2B5454B6CE53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A4B117B-E945-4033-A79D-10DFAA3DF18B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA6D866F-8189-4FFD-AA24-47C0A015C246",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.13:netsec:*:*:*:*:*:*",
                     matchCriteriaId: "B2BAA1B3-7DD3-4248-915D-2BCC0ACFA2C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4EBFB79-C269-4132-BFAB-451F66CE8289",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.14:netsec:*:*:*:*:*:*",
                     matchCriteriaId: "21612C17-7368-4108-B55B-5AB5CA6733E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9E1028E-2C07-4BA3-B891-FA853A87B280",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.15:netsec:*:*:*:*:*:*",
                     matchCriteriaId: "8A0D57D7-15AD-4CDF-A5A7-AB83F8E6154E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E74F577-70BD-4FAF-BCFD-10CD21FC5601",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.16:netsec:*:*:*:*:*:*",
                     matchCriteriaId: "06DB25C8-4EA5-465F-8EFA-BCA8D40F1795",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:*",
                     matchCriteriaId: "57BB03E2-E61C-4A94-82DF-8720698CE271",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.17:netsec:*:*:*:*:*:*",
                     matchCriteriaId: "A149F8C2-3DA5-44B2-A288-3482F3975824",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B30A36F-5CE6-4246-8752-176FB5999C1A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.18:netsec:*:*:*:*:*:*",
                     matchCriteriaId: "9462B320-B69D-409D-8DCC-D8D6CA1A757D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0F76DFD-4DAC-4B02-8967-B242CDEEF6C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.19:netsec:*:*:*:*:*:*",
                     matchCriteriaId: "ECCCBAE9-8FD4-43F0-9EF8-56E9BBA3D8C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A59BC20-3217-4584-9196-D1CD9E0D6B52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.20:netsec:*:*:*:*:*:*",
                     matchCriteriaId: "BEA0014A-659B-4533-A393-6D4ADC80EB0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:*",
                     matchCriteriaId: "56F728BA-FC9E-4EEE-9A08-C9C7433BD8D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.21:netsec:*:*:*:*:*:*",
                     matchCriteriaId: "8F1621F9-7C84-4CF0-BBCD-CEAEE8683BAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C64DF29-5B3D-401E-885E-8E37FD577254",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.21.1:netsec:*:*:*:*:*:*",
                     matchCriteriaId: "346C9F65-B5FB-4A75-8E1B-137112F270D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A7BF52A-2FF8-40ED-B757-28A1101DE8F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.22:netsec:*:*:*:*:*:*",
                     matchCriteriaId: "7EFEE380-0C64-4413-AF3A-45ABC8833500",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A321C2D-852B-4498-ADD6-79956410AB94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.23:netsec:*:*:*:*:*:*",
                     matchCriteriaId: "8CA18FC6-1480-400E-A885-8CDAE45AA7A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D5F0DCF-C6A2-4A09-90C9-D70F174FDEF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.24:netsec:*:*:*:*:*:*",
                     matchCriteriaId: "93741261-378B-4C02-8D68-0E5F39128375",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:*",
                     matchCriteriaId: "C820538E-14EC-43C1-80DB-6AAE4905EF0B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.25:netsec:*:*:*:*:*:*",
                     matchCriteriaId: "07CF9DD6-B624-49F0-A8E4-7EBCE7932BEE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.26:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9562112-2505-4F78-86DE-F30EFAEE47D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.26:netsec:*:*:*:*:*:*",
                     matchCriteriaId: "9EEA1E9C-C1FB-4EFD-86EA-DCF78C57FC35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A6D8FD0-C8C1-4868-9AF1-96B1949C18AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.26.1:netsec:*:*:*:*:*:*",
                     matchCriteriaId: "5E20FAF7-9031-478E-A89C-D6FB3B5FDE3A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "72A840B4-216B-4063-997F-791FBC8C8658",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.26.2:netsec:*:*:*:*:*:*",
                     matchCriteriaId: "72375576-F857-4585-A677-A326D89A65B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.27:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE47A547-26E7-48F9-B0A6-2F65E04A1EDE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.2.28:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1AEB744-FCF2-4A41-8866-9D1D20E6C6B8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "967DF432-DEF4-4FA2-8C8D-19A7FB663A33",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.0:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "40850BF4-E252-4667-9B46-9B6FEF6E997D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.0:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "1BB01DD1-B29B-4210-88CC-9ADB3148A410",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.0:beta4:*:*:*:*:*:*",
                     matchCriteriaId: "5C0FA6A3-BFA9-4397-B75B-75C8357C36B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "295D4042-2D3C-481B-B969-2DDAC1161198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "99E9EE2A-56AD-42BC-8CB0-D34091849B0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "96877A3E-B54B-4F31-B281-76CDC98B2D02",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D0B4503-42A6-4D88-954E-A662E91EC204",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4B73813-BCD8-429E-B9B9-D6665E026BC5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BBA3ECC-4F40-41CD-A6D7-BBD680DDBACC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CBE2156-AF86-4C72-B33D-3FF83930F828",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "61408884-FBBF-4D94-A552-F99AB46DCED6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A527277-D97D-4B74-906F-7481BDBD96D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8B57A32-7B83-4783-A244-C26301970444",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "044FD0D0-FC92-4A01-B0D4-11A703EF21FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.10.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3477EC1A-9634-492C-B052-35770A9C9F4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C90F104-FA2C-4091-B149-1774AC982C0F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9328768-7C08-4143-B5F8-F5C2D735D21A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.12.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C04E2B3-094B-4828-A2FC-BB66244A9F73",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BDE3D31-4BB2-45A3-B085-8C91152A3152",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE0107D4-395E-45F1-B963-7618CCC007D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.15:*:*:*:*:*:*:*",
                     matchCriteriaId: "53B8E11B-4984-45A8-A107-D276205988B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "2495DB98-F923-4E60-86EC-2DBB7A98C90C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.16.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E186D125-996E-4900-A2B8-5CDC8B5D5136",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.16.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "27DC6CF7-4DF8-4472-A684-8CCB5E26FCFD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.17:*:*:*:*:*:*:*",
                     matchCriteriaId: "88576385-EF03-408B-9775-B52E6AFFE48A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.18:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A838577-2BA1-4792-8B69-6FB07FFD7727",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.18.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDEED3E1-13E0-46E6-8AAB-D24D2D04AE4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.19:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "BFC1BB05-15C6-4829-86EB-5B1BFA4B5B17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.19:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "AB77E88B-7233-4979-914E-24E671C1FB23",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.19:rc3:*:*:*:*:*:*",
                     matchCriteriaId: "C4FF0F09-0268-480F-A2F3-6F8C3F323EEB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:open_source:1.4.19:rc4:*:*:*:*:*:*",
                     matchCriteriaId: "1CCF9CAE-674A-4833-9D5C-FCBD865BE9F6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:s800i:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "15C01793-C5D3-4359-B332-A8A104832370",
                     versionEndIncluding: "1.1.0.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:s800i:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C3A0A08-4107-4B8B-AE7E-DC23849A54DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:s800i:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "9320928D-D83C-4258-AF62-AB2D1F50D972",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:s800i:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "569084D1-977D-41FC-A444-0B3F5199DDD3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:s800i:1.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D182FB-761C-4F08-A776-B613FAC55230",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:s800i:1.0.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9046D49-6878-4571-8B9E-2FBD5BA80D19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:s800i:1.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7B5EDAB-61DD-4864-A159-39292D339DA2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:asterisk:s800i:1.1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "101DFEFB-7627-4D36-AAA2-EDFB4D0E5AB5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The IAX2 channel driver (chan_iax2) in Asterisk 1.2 before revision 72630 and 1.4 before revision 65679, when configured to allow unauthenticated calls, sends \"early audio\" to an unverified source IP address of a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed NEW message.",
      },
      {
         lang: "es",
         value: "El IAX2 channel driver (chan_iax2) en Asterisk 1.2 anterior a la revisión 72630 y 1.4 anterior a la revisión 65679, cuando está configurado para permitir llamadas sin autenticación, envía \"early audio\" a una IP sin verificar de un mensaje NEW, lo que permite a atacantes remotos provocar una denegación de servicio (amplificación del tráfico) a través de un mensaje NEW falseado.",
      },
   ],
   id: "CVE-2008-1923",
   lastModified: "2024-11-21T00:45:40.483",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2008-04-23T16:05:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://bugs.digium.com/view.php?id=10078",
      },
      {
         source: "cve@mitre.org",
         url: "http://downloads.digium.com/pub/security/AST-2008-006.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.altsci.com/concepts/page.php?s=asteri&p=1",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/42049",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://bugs.digium.com/view.php?id=10078",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://downloads.digium.com/pub/security/AST-2008-006.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.altsci.com/concepts/page.php?s=asteri&p=1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/42049",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-16",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.