Vulnerability Name:

CVE-2008-0095 (CCN-39361)

Assigned:2008-01-02
Published:2008-01-02
Updated:2018-10-15
Summary:The SIP channel driver in Asterisk Open Source 1.4.x before 1.4.17, Business Edition before C.1.0-beta8, AsteriskNOW before beta7, Appliance Developer Kit before Asterisk 1.4 revision 95946, and Appliance s800i 1.0.x before 1.0.3.4 allows remote attackers to cause a denial of service (daemon crash) via a BYE message with an Also (Also transfer) header, which triggers a NULL pointer dereference.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-399
Vulnerability Consequences:Denial of Service
References:Source: MISC
Type: Patch
http://bugs.digium.com/view.php?id=11637

Source: MITRE
Type: CNA
CVE-2008-0095

Source: CONFIRM
Type: Patch
http://downloads.digium.com/pub/security/AST-2008-001.html

Source: CCN
Type: AST-2008-001
Remote Crash Vulnerability in SIP channel driver

Source: SECUNIA
Type: UNKNOWN
28299

Source: CCN
Type: SA28312
Asterisk "BYE/Also" Denial of Service Vulnerability

Source: SECUNIA
Type: Patch, Vendor Advisory
28312

Source: SREASON
Type: UNKNOWN
3520

Source: CCN
Type: SECTRACK ID: 1019152
Asterisk SIP Channel Driver Can Be Crashed By Remote Users With 'BYE with Also' Method

Source: CCN
Type: OSVDB ID: 39841
Asterisk BYE/Also Transfer Method DoS

Source: BUGTRAQ
Type: UNKNOWN
20080102 AST-2008-001: Crash from transfer using BYE with Also header

Source: BID
Type: Exploit, Patch
27110

Source: CCN
Type: BID-27110
Asterisk BYE Message Remote Denial of Service Vulnerability

Source: SECTRACK
Type: UNKNOWN
1019152

Source: VUPEN
Type: UNKNOWN
ADV-2008-0019

Source: XF
Type: UNKNOWN
asterisk-bye-also-dos(39361)

Source: XF
Type: UNKNOWN
asterisk-bye-also-dos(39361)

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [01-02-2008]

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-0198

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-0199

Vulnerable Configuration:Configuration 1:
  • cpe:/a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:* (Version <= 1.4_revision_95945)
  • OR cpe:/a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:* (Version <= c.1.0beta7)
  • OR cpe:/a:asterisk:asterisknow:*:*:*:*:*:*:*:* (Version <= beta_6)
  • OR cpe:/a:asterisk:open_source:*:*:*:*:*:*:*:* (Version <= 1.4.16)
  • OR cpe:/a:asterisk:s800i:*:*:*:*:*:*:*:* (Version <= 1.0.3.3)

  • * Denotes that component is vulnerable
    BACK
    asterisk asterisk appliance developer kit *
    asterisk asterisk business edition *
    asterisk asterisknow *
    asterisk open source *
    asterisk s800i *