Vulnerability Name:

CVE-2008-1897 (CCN-41966)

Assigned:2008-04-22
Published:2008-04-22
Updated:2018-10-11
Summary:The IAX2 channel driver (chan_iax2) in Asterisk Open Source 1.0.x, 1.2.x before 1.2.28, and 1.4.x before 1.4.19.1; Business Edition A.x.x, B.x.x before B.2.5.2, and C.x.x before C.1.8.1; AsteriskNOW before 1.0.3; Appliance Developer Kit 0.x.x; and s800i before 1.1.0.3, when configured to allow unauthenticated calls, does not verify that an ACK response contains a call number matching the server's reply to a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed ACK response that does not complete a 3-way handshake.
Note: this issue exists because of an incomplete fix for CVE-2008-1923.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
3.2 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-287
Vulnerability Consequences:Denial of Service
References:Source: CCN
Type: Digium Issue Tracker ID 0010078
IAX2 protocol flaw in IC_NEW could cause reflective amplification DoS

Source: CONFIRM
Type: UNKNOWN
http://bugs.digium.com/view.php?id=10078

Source: MITRE
Type: CNA
CVE-2008-1897

Source: CCN
Type: AST-2008-006
3-way handshake in IAX2 incomplete

Source: CONFIRM
Type: UNKNOWN
http://downloads.digium.com/pub/security/AST-2008-006.html

Source: CCN
Type: SA29927
Asterisk IAX2 Handshake Denial of Service

Source: SECUNIA
Type: Vendor Advisory
29927

Source: SECUNIA
Type: Vendor Advisory
30010

Source: SECUNIA
Type: Vendor Advisory
30042

Source: SECUNIA
Type: UNKNOWN
34982

Source: GENTOO
Type: UNKNOWN
GLSA-200905-01

Source: CCN
Type: SECTRACK ID: 1019918
Asterisk IAX2 Protocol Verification Bug Lets Remote Users Deny Service

Source: MISC
Type: UNKNOWN
http://www.altsci.com/concepts/page.php?s=asteri&p=2

Source: DEBIAN
Type: UNKNOWN
DSA-1563

Source: DEBIAN
Type: DSA-1563
asterisk -- denial of service

Source: CCN
Type: GLSA-200905-01
Asterisk: Multiple vulnerabilities

Source: BUGTRAQ
Type: UNKNOWN
20080422 AST-2008-006 - 3-way handshake in IAX2 incomplete

Source: BID
Type: UNKNOWN
28901

Source: CCN
Type: BID-28901
Asterisk IAX2 Packet Amplification Remote Denial of Service Vulnerability

Source: SECTRACK
Type: UNKNOWN
1019918

Source: VUPEN
Type: UNKNOWN
ADV-2008-1324

Source: XF
Type: UNKNOWN
asterisk-iax2protocol-ack-dos(41966)

Source: XF
Type: UNKNOWN
asterisk-iax2protocol-ack-dos(41966)

Source: CCN
Type: AltSci Concepts Web site
AltSci Concepts IAX2 Exploit Framework

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-3365

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-3390

Vulnerable Configuration:Configuration 1:
  • cpe:/a:asterisk:asterisk_appliance_developer_kit:0.2:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_appliance_developer_kit:0.3:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_appliance_developer_kit:0.4:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_appliance_developer_kit:0.5:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_appliance_developer_kit:0.6:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_appliance_developer_kit:0.6.0:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_appliance_developer_kit:0.7:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_appliance_developer_kit:0.8:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_business_edition:a:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_business_edition:b.1.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_business_edition:b.1.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_business_edition:b.2.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_business_edition:b.2.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_business_edition:b.2.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_business_edition:b.2.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_business_edition:b.2.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_business_edition:b.2.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_business_edition:b.2.3.6:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_business_edition:b.2.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:* (Version <= b.2.5.1)
  • OR cpe:/a:asterisk:asterisk_business_edition:c.1.0:beta7:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_business_edition:c.1.0:beta8:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_business_edition:c.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_business_edition:c.1.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_business_edition:c.1.6.2:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:* (Version <= c1.8.0)
  • OR cpe:/a:asterisk:asterisknow:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisknow:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:asterisknow:*:*:*:*:*:*:*:* (Version <= 1.0.2)
  • OR cpe:/a:asterisk:open_source:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.0:rc2:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.0.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.0.11:patch:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.0.11.1:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.0.11.1:patch:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.0.12:patch:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.0:beta1:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.0:beta2:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.0:rc2:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.2:netsec:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.3:netsec:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.4:netsec:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.5:netsec:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.6:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.6:netsec:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.7:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.7:netsec:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.7.1:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.7.1:netsec:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.8:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.8:netsec:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.9:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.9.1:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.9.1:netsec:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.10:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.10:netsec:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.11:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.11:netsec:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.12:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.12:netsec:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.12.1:netsec:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.13:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.13:netsec:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.14:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.14:netsec:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.15:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.15:netsec:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.16:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.16:netsec:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.17:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.17:netsec:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.18:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.18:netsec:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.19:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.19:netsec:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.20:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.20:netsec:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.21:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.21:netsec:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.21.1:netsec:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.22:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.22:netsec:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.23:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.23:netsec:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.24:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.24:netsec:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.25:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.25:netsec:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.26:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.26:netsec:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.26.1:netsec:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.2.26.2:netsec:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:*:*:*:*:*:*:*:* (Version <= 1.2.27)
  • OR cpe:/a:asterisk:open_source:1.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.4.0:beta2:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.4.0:beta3:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.4.0:beta4:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.4.10:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.4.10.1:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.4.11:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.4.12:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.4.12.1:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.4.13:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.4.14:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.4.15:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.4.16:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.4.16.1:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.4.16.2:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.4.17:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.4.18:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:1.4.18.1:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:open_source:*:*:*:*:*:*:*:* (Version <= 1.4.19)
  • OR cpe:/a:asterisk:s800i:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:s800i:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:s800i:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:s800i:1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:s800i:1.0.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:s800i:1.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:s800i:1.1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:s800i:*:*:*:*:*:*:*:* (Version <= 1.1.0.2)

  • Configuration CCN 1:
  • cpe:/a:digium:asterisk:b.2.5.1:-:business:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:c.1.8.0:-:business:*:*:*:*:*
  • AND
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:7422
    P
    DSA-1563 asterisk -- programming error
    2015-02-23
    oval:org.mitre.oval:def:20041
    P
    DSA-1563-1 asterisk - denial of service
    2014-06-23
    oval:org.opensuse.security:def:20081897
    V
    CVE-2008-1897
    2012-07-03
    oval:org.debian:def:1563
    V
    programming error
    2008-04-30
    BACK
    asterisk asterisk appliance developer kit 0.2
    asterisk asterisk appliance developer kit 0.3
    asterisk asterisk appliance developer kit 0.4
    asterisk asterisk appliance developer kit 0.5
    asterisk asterisk appliance developer kit 0.6
    asterisk asterisk appliance developer kit 0.6.0
    asterisk asterisk appliance developer kit 0.7
    asterisk asterisk appliance developer kit 0.8
    asterisk asterisk business edition a
    asterisk asterisk business edition b.1.3.2
    asterisk asterisk business edition b.1.3.3
    asterisk asterisk business edition b.2.2.0
    asterisk asterisk business edition b.2.2.1
    asterisk asterisk business edition b.2.3.1
    asterisk asterisk business edition b.2.3.2
    asterisk asterisk business edition b.2.3.3
    asterisk asterisk business edition b.2.3.4
    asterisk asterisk business edition b.2.3.6
    asterisk asterisk business edition b.2.5.0
    asterisk asterisk business edition *
    asterisk asterisk business edition c.1.0 beta7
    asterisk asterisk business edition c.1.0 beta8
    asterisk asterisk business edition c.1.6
    asterisk asterisk business edition c.1.6.1
    asterisk asterisk business edition c.1.6.2
    asterisk asterisk business edition *
    asterisk asterisknow 1.0
    asterisk asterisknow 1.0.1
    asterisk asterisknow *
    asterisk open source 1.0
    asterisk open source 1.0 rc1
    asterisk open source 1.0 rc2
    asterisk open source 1.0.0
    asterisk open source 1.0.1
    asterisk open source 1.0.2
    asterisk open source 1.0.3
    asterisk open source 1.0.3.4
    asterisk open source 1.0.4
    asterisk open source 1.0.5
    asterisk open source 1.0.6
    asterisk open source 1.0.7
    asterisk open source 1.0.8
    asterisk open source 1.0.9
    asterisk open source 1.0.11
    asterisk open source 1.0.11 patch
    asterisk open source 1.0.11.1
    asterisk open source 1.0.11.1 patch
    asterisk open source 1.0.12
    asterisk open source 1.0.12 patch
    asterisk open source 1.2.0
    asterisk open source 1.2.0 beta1
    asterisk open source 1.2.0 beta2
    asterisk open source 1.2.0 rc1
    asterisk open source 1.2.0 rc2
    asterisk open source 1.2.1
    asterisk open source 1.2.2
    asterisk open source 1.2.2 netsec
    asterisk open source 1.2.3
    asterisk open source 1.2.3 netsec
    asterisk open source 1.2.4
    asterisk open source 1.2.4 netsec
    asterisk open source 1.2.5
    asterisk open source 1.2.5 netsec
    asterisk open source 1.2.6
    asterisk open source 1.2.6 netsec
    asterisk open source 1.2.7
    asterisk open source 1.2.7 netsec
    asterisk open source 1.2.7.1
    asterisk open source 1.2.7.1 netsec
    asterisk open source 1.2.8
    asterisk open source 1.2.8 netsec
    asterisk open source 1.2.9
    asterisk open source 1.2.9.1
    asterisk open source 1.2.9.1 netsec
    asterisk open source 1.2.10
    asterisk open source 1.2.10 netsec
    asterisk open source 1.2.11
    asterisk open source 1.2.11 netsec
    asterisk open source 1.2.12
    asterisk open source 1.2.12 netsec
    asterisk open source 1.2.12.1
    asterisk open source 1.2.12.1 netsec
    asterisk open source 1.2.13
    asterisk open source 1.2.13 netsec
    asterisk open source 1.2.14
    asterisk open source 1.2.14 netsec
    asterisk open source 1.2.15
    asterisk open source 1.2.15 netsec
    asterisk open source 1.2.16
    asterisk open source 1.2.16 netsec
    asterisk open source 1.2.17
    asterisk open source 1.2.17 netsec
    asterisk open source 1.2.18
    asterisk open source 1.2.18 netsec
    asterisk open source 1.2.19
    asterisk open source 1.2.19 netsec
    asterisk open source 1.2.20
    asterisk open source 1.2.20 netsec
    asterisk open source 1.2.21
    asterisk open source 1.2.21 netsec
    asterisk open source 1.2.21.1
    asterisk open source 1.2.21.1 netsec
    asterisk open source 1.2.22
    asterisk open source 1.2.22 netsec
    asterisk open source 1.2.23
    asterisk open source 1.2.23 netsec
    asterisk open source 1.2.24
    asterisk open source 1.2.24 netsec
    asterisk open source 1.2.25
    asterisk open source 1.2.25 netsec
    asterisk open source 1.2.26
    asterisk open source 1.2.26 netsec
    asterisk open source 1.2.26.1
    asterisk open source 1.2.26.1 netsec
    asterisk open source 1.2.26.2
    asterisk open source 1.2.26.2 netsec
    asterisk open source *
    asterisk open source 1.4.0
    asterisk open source 1.4.0 beta2
    asterisk open source 1.4.0 beta3
    asterisk open source 1.4.0 beta4
    asterisk open source 1.4.1
    asterisk open source 1.4.10
    asterisk open source 1.4.10.1
    asterisk open source 1.4.11
    asterisk open source 1.4.12
    asterisk open source 1.4.12.1
    asterisk open source 1.4.13
    asterisk open source 1.4.14
    asterisk open source 1.4.15
    asterisk open source 1.4.16
    asterisk open source 1.4.16.1
    asterisk open source 1.4.16.2
    asterisk open source 1.4.17
    asterisk open source 1.4.18
    asterisk open source 1.4.18.1
    asterisk open source *
    asterisk s800i 1.0
    asterisk s800i 1.0.1
    asterisk s800i 1.0.2
    asterisk s800i 1.0.3
    asterisk s800i 1.0.3.3
    asterisk s800i 1.1.0
    asterisk s800i 1.1.0.1
    asterisk s800i *
    digium asterisk b.2.5.1 -
    digium asterisk c.1.8.0 -
    gentoo linux *
    debian debian linux 4.0