Vulnerability Name:

CVE-2008-1289 (CCN-41302)

Assigned:2008-03-18
Published:2008-03-18
Updated:2018-10-11
Summary:Multiple buffer overflows in Asterisk Open Source 1.4.x before 1.4.18.1 and 1.4.19-rc3, Open Source 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6.1, AsteriskNOW 1.0.x before 1.0.2, Appliance Developer Kit before 1.4 revision 109386, and s800i 1.1.x before 1.1.0.2 allow remote attackers to (1) write a zero to an arbitrary memory location via a large RTP payload number, related to the ast_rtp_unset_m_type function in main/rtp.c; or (2) write certain integers to an arbitrary memory location via a large number of RTP payloads, related to the process_sdp function in channels/chan_sip.c.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Authentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Athentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2008-1289

Source: CCN
Type: AST-2008-002
Two buffer overflows in RTP Codec Payload Handling

Source: CONFIRM
Type: UNKNOWN
http://downloads.digium.com/pub/security/AST-2008-002.html

Source: MISC
Type: Exploit
http://labs.musecurity.com/advisories/MU-200803-01.txt

Source: CCN
Type: SA29426
Asterisk Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
29426

Source: SECUNIA
Type: UNKNOWN
29470

Source: SREASON
Type: UNKNOWN
3763

Source: CCN
Type: SECTRACK ID: 1019628
Asterisk Buffer Overflow in Processing RTP Codec Payload Lets Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: UNKNOWN
1019628

Source: CONFIRM
Type: UNKNOWN
http://www.asterisk.org/node/48466

Source: BUGTRAQ
Type: UNKNOWN
20080318 AST-2008-002: Two buffer overflows in RTP Codec Payload Handling

Source: BID
Type: Exploit
28308

Source: CCN
Type: BID-28308
Asterisk RTP Codec Payload Handling Multiple Buffer Overflow Vulnerabilities

Source: VUPEN
Type: UNKNOWN
ADV-2008-0928

Source: XF
Type: UNKNOWN
asterisk-rtppayload-bo(41302)

Source: XF
Type: UNKNOWN
asterisk-rtppayload-bo(41302)

Source: XF
Type: UNKNOWN
asterisk-rtp-codecpayload-bo(41305)

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-2554

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-2620

Vulnerable Configuration:Configuration 1:
  • cpe:/a:asterisk:asterisk_appliance_developer_kit:1.4:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:* (Version <= c.1.0-beta8)
  • OR cpe:/a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:* (Version <= c.1.0beta7)
  • OR cpe:/a:asterisk:asterisknow:*:*:*:*:*:*:*:* (Version <= 1.0.1)
  • OR cpe:/a:asterisk:open_source:*:*:*:*:*:*:*:* (Version <= 1.4.18)
  • OR cpe:/a:asterisk:open_source:*:rc-2:*:*:*:*:*:* (Version <= 1.4.19)
  • OR cpe:/a:asterisk:open_source:*:*:*:*:*:*:*:* (Version <= 1.6.0_beta5)
  • OR cpe:/a:asterisk:s800i:*:*:*:*:*:*:*:* (Version <= 1.1.0.1)

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2008-1289 (CCN-41305)

    Assigned:2008-03-18
    Published:2008-03-18
    Updated:2018-10-11
    Summary:Multiple buffer overflows in Asterisk Open Source 1.4.x before 1.4.18.1 and 1.4.19-rc3, Open Source 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6.1, AsteriskNOW 1.0.x before 1.0.2, Appliance Developer Kit before 1.4 revision 109386, and s800i 1.1.x before 1.1.0.2 allow remote attackers to (1) write a zero to an arbitrary memory location via a large RTP payload number, related to the ast_rtp_unset_m_type function in main/rtp.c; or (2) write certain integers to an arbitrary memory location via a large number of RTP payloads, related to the process_sdp function in channels/chan_sip.c.
    CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): Low
    Availibility (A): Low
    CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Type:CWE-119
    Vulnerability Consequences:Gain Access
    References:Source: MITRE
    Type: CNA
    CVE-2008-1289

    Source: CCN
    Type: AST-2008-002
    Two buffer overflows in RTP Codec Payload Handling

    Source: CCN
    Type: SA29426
    Asterisk Multiple Vulnerabilities

    Source: CCN
    Type: SECTRACK ID: 1019628
    Asterisk Buffer Overflow in Processing RTP Codec Payload Lets Remote Users Execute Arbitrary Code

    Source: CCN
    Type: BID-28308
    Asterisk RTP Codec Payload Handling Multiple Buffer Overflow Vulnerabilities

    Source: XF
    Type: UNKNOWN
    asterisk-rtp-codecpayload-bo(41305)

    BACK
    asterisk asterisk appliance developer kit 1.4
    asterisk asterisk business edition *
    asterisk asterisk business edition *
    asterisk asterisknow *
    asterisk open source *
    asterisk open source * rc-2
    asterisk open source *
    asterisk s800i *