Vulnerability Name:

CVE-2008-1390 (CCN-41304)

Assigned:2008-03-19
Published:2008-03-19
Updated:2018-10-11
Summary:The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-255
Vulnerability Consequences:Other
References:Source: MITRE
Type: CNA
CVE-2008-1390

Source: CCN
Type: AST-2008-005
HTTP Manager ID is predictable

Source: CONFIRM
Type: UNKNOWN
http://downloads.digium.com/pub/security/AST-2008-005.html

Source: CCN
Type: SA29449
Asterisk Predictable HTTP Manager ID Weakness

Source: SECUNIA
Type: Vendor Advisory
29449

Source: SECUNIA
Type: UNKNOWN
29470

Source: SREASON
Type: UNKNOWN
3764

Source: CCN
Type: SECTRACK ID: 1019679
Asterisk Predictable Session IDs May Let Remote Users Hijack HTTP Manager Sessions

Source: CCN
Type: OSVDB ID: 43413
Asterisk HTTP Manager ID Prediction Weakness

Source: BUGTRAQ
Type: UNKNOWN
20080318 AST-2008-005: HTTP Manager ID is predictable

Source: BID
Type: UNKNOWN
28316

Source: CCN
Type: BID-28316
Asterisk Predictable HTTP Manager Session ID Security Bypass Vulnerability

Source: SECTRACK
Type: UNKNOWN
1019679

Source: XF
Type: UNKNOWN
asterisk-httpmanagerid-weak-security(41304)

Source: XF
Type: UNKNOWN
asterisk-httpmanagerid-weak-security(41304)

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-2554

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-2620

Vulnerable Configuration:Configuration 1:
  • cpe:/a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk:1.4.3:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk:1.4.4:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk:1.4.5:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk:1.4.6:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk:1.4.7:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk:1.4.8:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk:1.4.9:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk:1.4.10:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk:1.4.11:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk:1.4.12:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk:1.4.13:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk:1.4.14:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk:1.4.15:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk:1.4.16:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk:1.4.17:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk:1.4.18.1:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk:1.4_revision_95946:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk:1.6:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_appliance_developer_kit:0.2:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_appliance_developer_kit:0.3:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_appliance_developer_kit:0.4:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_appliance_developer_kit:0.5:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_appliance_developer_kit:0.6:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_appliance_developer_kit:0.7:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_appliance_developer_kit:0.8:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_appliance_developer_kit:1.4:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_business_edition:c.1.0-beta7:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_business_edition:c.1.0-beta8:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisknow:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisknow:beta_7:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:s800i:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:s800i:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:s800i:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:s800i:1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:s800i:1.1.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    asterisk asterisk 1.4.1
    asterisk asterisk 1.4.2
    asterisk asterisk 1.4.3
    asterisk asterisk 1.4.4
    asterisk asterisk 1.4.5
    asterisk asterisk 1.4.6
    asterisk asterisk 1.4.7
    asterisk asterisk 1.4.8
    asterisk asterisk 1.4.9
    asterisk asterisk 1.4.10
    asterisk asterisk 1.4.11
    asterisk asterisk 1.4.12
    asterisk asterisk 1.4.13
    asterisk asterisk 1.4.14
    asterisk asterisk 1.4.15
    asterisk asterisk 1.4.16
    asterisk asterisk 1.4.17
    asterisk asterisk 1.4.18.1
    asterisk asterisk 1.4_beta
    asterisk asterisk 1.4_revision_95946
    asterisk asterisk 1.6
    asterisk asterisk appliance developer kit 0.2
    asterisk asterisk appliance developer kit 0.3
    asterisk asterisk appliance developer kit 0.4
    asterisk asterisk appliance developer kit 0.5
    asterisk asterisk appliance developer kit 0.6
    asterisk asterisk appliance developer kit 0.7
    asterisk asterisk appliance developer kit 0.8
    asterisk asterisk appliance developer kit 1.4
    asterisk asterisk business edition c.1.0-beta7
    asterisk asterisk business edition c.1.0-beta8
    asterisk asterisknow 1.0
    asterisk asterisknow beta_5
    asterisk asterisknow beta_6
    asterisk asterisknow beta_7
    asterisk s800i 1.0
    asterisk s800i 1.0.1
    asterisk s800i 1.0.2
    asterisk s800i 1.0.3
    asterisk s800i 1.1.0