7.5
CVSSv2

CVE-2008-1289

Published: 24/03/2008 Updated: 11/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple buffer overflows in Asterisk Open Source 1.4.x prior to 1.4.18.1 and 1.4.19-rc3, Open Source 1.6.x prior to 1.6.0-beta6, Business Edition C.x.x before C.1.6.1, AsteriskNOW 1.0.x prior to 1.0.2, Appliance Developer Kit prior to 1.4 revision 109386, and s800i 1.1.x prior to 1.1.0.2 allow remote malicious users to (1) write a zero to an arbitrary memory location via a large RTP payload number, related to the ast_rtp_unset_m_type function in main/rtp.c; or (2) write certain integers to an arbitrary memory location via a large number of RTP payloads, related to the process_sdp function in channels/chan_sip.c.

Vulnerable Product Search on Vulmon Subscribe to Product

asterisk open source

asterisk s800i

asterisk asterisk business edition

asterisk asterisknow

asterisk asterisk appliance developer kit 1.4

Exploits

source: wwwsecurityfocuscom/bid/28308/info Asterisk is prone to multiple buffer-overflow vulnerabilities because it fails to perform adequate boundary checks on user-supplied data before copying it to insufficiently sized buffers Exploiting these issues may allow an attacker to corrupt memory and cause denial-of-service conditions or po ...