Vulnerability Name: | CVE-2008-1289 (CCN-41302) | ||||||||
Assigned: | 2008-03-18 | ||||||||
Published: | 2008-03-18 | ||||||||
Updated: | 2018-10-11 | ||||||||
Summary: | Multiple buffer overflows in Asterisk Open Source 1.4.x before 1.4.18.1 and 1.4.19-rc3, Open Source 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6.1, AsteriskNOW 1.0.x before 1.0.2, Appliance Developer Kit before 1.4 revision 109386, and s800i 1.1.x before 1.1.0.2 allow remote attackers to (1) write a zero to an arbitrary memory location via a large RTP payload number, related to the ast_rtp_unset_m_type function in main/rtp.c; or (2) write certain integers to an arbitrary memory location via a large number of RTP payloads, related to the process_sdp function in channels/chan_sip.c. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-119 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2008-1289 Source: CCN Type: AST-2008-002 Two buffer overflows in RTP Codec Payload Handling Source: CONFIRM Type: UNKNOWN http://downloads.digium.com/pub/security/AST-2008-002.html Source: MISC Type: Exploit http://labs.musecurity.com/advisories/MU-200803-01.txt Source: CCN Type: SA29426 Asterisk Multiple Vulnerabilities Source: SECUNIA Type: Vendor Advisory 29426 Source: SECUNIA Type: UNKNOWN 29470 Source: SREASON Type: UNKNOWN 3763 Source: CCN Type: SECTRACK ID: 1019628 Asterisk Buffer Overflow in Processing RTP Codec Payload Lets Remote Users Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN 1019628 Source: CONFIRM Type: UNKNOWN http://www.asterisk.org/node/48466 Source: BUGTRAQ Type: UNKNOWN 20080318 AST-2008-002: Two buffer overflows in RTP Codec Payload Handling Source: BID Type: Exploit 28308 Source: CCN Type: BID-28308 Asterisk RTP Codec Payload Handling Multiple Buffer Overflow Vulnerabilities Source: VUPEN Type: UNKNOWN ADV-2008-0928 Source: XF Type: UNKNOWN asterisk-rtppayload-bo(41302) Source: XF Type: UNKNOWN asterisk-rtppayload-bo(41302) Source: XF Type: UNKNOWN asterisk-rtp-codecpayload-bo(41305) Source: FEDORA Type: UNKNOWN FEDORA-2008-2554 Source: FEDORA Type: UNKNOWN FEDORA-2008-2620 | ||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
Vulnerability Name: | CVE-2008-1289 (CCN-41305) | ||||||||
Assigned: | 2008-03-18 | ||||||||
Published: | 2008-03-18 | ||||||||
Updated: | 2018-10-11 | ||||||||
Summary: | Multiple buffer overflows in Asterisk Open Source 1.4.x before 1.4.18.1 and 1.4.19-rc3, Open Source 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6.1, AsteriskNOW 1.0.x before 1.0.2, Appliance Developer Kit before 1.4 revision 109386, and s800i 1.1.x before 1.1.0.2 allow remote attackers to (1) write a zero to an arbitrary memory location via a large RTP payload number, related to the ast_rtp_unset_m_type function in main/rtp.c; or (2) write certain integers to an arbitrary memory location via a large number of RTP payloads, related to the process_sdp function in channels/chan_sip.c. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-119 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2008-1289 Source: CCN Type: AST-2008-002 Two buffer overflows in RTP Codec Payload Handling Source: CCN Type: SA29426 Asterisk Multiple Vulnerabilities Source: CCN Type: SECTRACK ID: 1019628 Asterisk Buffer Overflow in Processing RTP Codec Payload Lets Remote Users Execute Arbitrary Code Source: CCN Type: BID-28308 Asterisk RTP Codec Payload Handling Multiple Buffer Overflow Vulnerabilities Source: XF Type: UNKNOWN asterisk-rtp-codecpayload-bo(41305) | ||||||||
BACK |