Vulnerability Name:

CVE-2008-5396 (CCN-46978)

Assigned:2008-11-23
Published:2008-11-23
Updated:2009-05-14
Summary:Array index error in the (1) torisa.c and (2) dahdi/tor2.c drivers in Zaptel (aka DAHDI) 1.4.11 and earlier allows local users in the dialout group to overwrite an integer value in kernel memory by writing to /dev/zap/ctl, related to missing validation of the sync field associated with the ZT_SPANCONFIG ioctl.
CVSS v3 Severity:5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.5 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:TF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
4.4 Medium (CCN CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P)
3.3 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:TF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-189
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: Debian Bug report logs - #507459
zaptel: insufficient input validation in some zaptel drivers

Source: CONFIRM
Type: UNKNOWN
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507459

Source: CONFIRM
Type: UNKNOWN
http://bugs.digium.com/view.php?id=13954

Source: MITRE
Type: CNA
CVE-2008-5396

Source: CCN
Type: SA32947
Zaptel "ZT_SPANCONFIG" IOCTL Privilege Escalation Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
32947

Source: CCN
Type: SA32960
DAHDI "ZT_SPANCONFIG" IOCTL Privilege Escalation Vulnerability

Source: SECUNIA
Type: UNKNOWN
32960

Source: CCN
Type: Digium SVN Repository
Revision 4587

Source: DEBIAN
Type: DSA-1699
zaptel -- array index error

Source: MLIST
Type: UNKNOWN
[oss-security] 20081203 CVE Request (zaptel)

Source: CCN
Type: OSVDB ID: 50698
Zaptel Multiple Driver ZT_SPANCONFIG IOCTL Sync Field Local Memory Overwrite

Source: CCN
Type: BID-32575
Digium Zaptel Multiple Local Privilege Escalation and Denial of Service Vulnerabilities

Source: XF
Type: UNKNOWN
zaptel-tor2spanconfig-privilege-escalation(46978)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:asterisk:zaptel:1.2:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:zaptel:1.2.27:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:zaptel:1.4:*:*:*:*:*:*:*
  • OR cpe:/a:asterisk:zaptel:*:*:*:*:*:*:*:* (Version <= 1.4.11)

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:7447
    P
    DSA-1699 zaptel -- array index error
    2015-02-23
    oval:org.debian:def:1699
    V
    array index error
    2009-01-11
    BACK
    asterisk zaptel 1.2
    asterisk zaptel 1.2.27
    asterisk zaptel 1.4
    asterisk zaptel *