4.3
CVSSv2

CVE-2008-2119

Published: 04/06/2008 Updated: 11/10/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

Asterisk Open Source 1.0.x and 1.2.x prior to 1.2.29 and Business Edition A.x.x and B.x.x before B.2.5.3, when pedantic parsing (aka pedanticsipchecking) is enabled, allows remote malicious users to cause a denial of service (daemon crash) via a SIP INVITE message that lacks a From header, related to invocations of the ast_uri_decode function, and improper handling of (1) an empty const string and (2) a NULL pointer.

Vulnerable Product Search on Vulmon Subscribe to Product

asterisk asterisk business edition b.2.2.1

asterisk asterisk business edition b.2.3.1

asterisk open source 1.0.0

asterisk open source 1.0.1

asterisk open source 1.0.5

asterisk open source 1.0.6

asterisk open source 1.2.10

asterisk open source 1.2.11

asterisk open source 1.2.17

asterisk open source 1.2.18

asterisk open source 1.2.23

asterisk open source 1.2.24

asterisk asterisk business edition b.1.3.2

asterisk asterisk business edition b.1.3.3

asterisk asterisk business edition b.2.2.0

asterisk asterisk business edition b2.5.1

asterisk open source 1.0

asterisk open source 1.0.3

asterisk open source 1.0.4

asterisk open source 1.2.0beta1

asterisk open source 1.2.0beta2

asterisk open source 1.2.1

asterisk open source 1.2.15

asterisk open source 1.2.16

asterisk open source 1.2.21.1

asterisk open source 1.2.22

asterisk asterisk business edition

asterisk open source

asterisk asterisk business edition b.2.3.2

asterisk asterisk business edition b.2.3.3

asterisk open source 1.0.11

asterisk open source 1.0.11.1

asterisk open source 1.0.7

asterisk open source 1.0.8

asterisk open source 1.2.12

asterisk open source 1.2.12.1

asterisk open source 1.2.19

asterisk open source 1.2.2

asterisk open source 1.2.25

asterisk open source 1.2.26

asterisk asterisk business edition b.2.3.4

asterisk asterisk business edition b.2.5.0

asterisk open source 1.0.12

asterisk open source 1.0.2

asterisk open source 1.0.9

asterisk open source 1.2.0

asterisk open source 1.2.13

asterisk open source 1.2.14

asterisk open source 1.2.20

asterisk open source 1.2.21

asterisk open source 1.2.26.1

asterisk open source 1.2.26.2

asterisk open source 1.2.27

Vendor Advisories

Debian Bug report logs - #484639 Two buffer overflows in evolution Package: evolution; Maintainer for evolution is Debian GNOME Maintainers <pkg-gnome-maintainers@listsaliothdebianorg>; Source for evolution is src:evolution (PTS, buildd, popcon) Reported by: Steffen Joeris <steffenjoeris@skolelinuxde> Date: Thu, ...

Exploits

#!/usr/bin/perl -w ############### # asterisk AST-2008-008 # by armandojmo@gmailcom #AST-2008-008 - Remote Crash Vulnerability in SIP channel driver when run in pedantic mode use Getopt::Std; use IO::Socket; use strict; my %args; getopts("h:p:", \%args); if (!$args{h} || !$args{p}) { usage(); } my $sock = IO::Socket::INET->new( Pr ...