7.8
CVSSv2

CVE-2008-3263

Published: 22/07/2008 Updated: 11/10/2018
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 785
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The IAX2 protocol implementation in Asterisk Open Source 1.0.x, 1.2.x prior to 1.2.30, and 1.4.x prior to 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x prior to 1.2.0.1 allows remote malicious users to cause a denial of service (call-number exhaustion and CPU consumption) by quickly sending a large number of IAX2 (IAX) POKE requests.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

asterisk asterisk 0.1.2

asterisk asterisk 0.1.0

asterisk asterisk 0.1.4

asterisk asterisk 0.1.5

asterisk asterisk 0.3

asterisk asterisk 0.4

asterisk asterisk 1.0.10

asterisk asterisk 1.0.11

asterisk asterisk 1.0.6

asterisk asterisk 1.0.7

asterisk asterisk 1.2.10

asterisk asterisk 1.2.11

asterisk asterisk 1.2.19

asterisk asterisk 1.2.2

asterisk asterisk 1.2.26

asterisk asterisk 1.2.26.1

asterisk asterisk 1.2.30

asterisk asterisk 1.2.4

asterisk asterisk 0.1.1

asterisk asterisk 0.1.10

asterisk asterisk 0.1.6

asterisk asterisk 0.1.7

asterisk asterisk 0.5.0

asterisk asterisk 0.7.0

asterisk asterisk 1.0.11.1

asterisk asterisk 1.0.12

asterisk asterisk 1.0.8

asterisk asterisk 1.0.9

asterisk asterisk 1.2.12

asterisk asterisk 1.2.13

asterisk asterisk 1.2.20

asterisk asterisk 1.2.21

asterisk asterisk 1.2.26.2

asterisk asterisk 1.2.27

asterisk asterisk 1.2.5

asterisk asterisk 1.2.6

asterisk asterisk 1.2.7

asterisk asterisk 1.4.11

asterisk asterisk 1.4.12

asterisk asterisk 1.4.17

asterisk asterisk 1.4.18

asterisk asterisk 1.4.5

asterisk asterisk 1.4.6

asterisk asterisk 1.4.7

asterisk asterisk a

asterisk asterisk b.1.3.2

asterisk asterisk 0.1.3

asterisk asterisk 0.1.9_1

asterisk asterisk 0.2

asterisk asterisk 0.9.0

asterisk asterisk 1.0

asterisk asterisk 1.0.1

asterisk asterisk 1.0.4

asterisk asterisk 1.0.5

asterisk asterisk 1.2.0_beta2

asterisk asterisk 1.2.1

asterisk asterisk 1.2.17

asterisk asterisk 1.2.18

asterisk asterisk 1.2.24

asterisk asterisk 1.2.25

asterisk asterisk 1.2.29

asterisk asterisk 1.2.3

asterisk asterisk 1.2.9

asterisk asterisk 1.2.9.1

asterisk asterisk 1.4.15

asterisk asterisk 1.4.16

asterisk asterisk 1.4.2

asterisk asterisk 1.4.3

asterisk asterisk 1.4_beta

asterisk asterisk 1.4_revision_95946

asterisk asterisk b.1.3.3

asterisk asterisk b.2.2.0

asterisk asterisk 1.4.1

asterisk asterisk 1.4.10

asterisk asterisk 1.4.16.1

asterisk asterisk 1.4.16.2

asterisk asterisk 1.4.4

asterisk asterisk 1.4.4_2007-04-27

asterisk asterisk 1.6

asterisk asterisk 0.1.11

asterisk asterisk 0.1.12

asterisk asterisk 0.1.8

asterisk asterisk 0.1.9

asterisk asterisk 0.7.1

asterisk asterisk 0.7.2

asterisk asterisk 1.0.2

asterisk asterisk 1.0.3

asterisk asterisk 1.2.0_beta1

asterisk asterisk 1.2.14

asterisk asterisk 1.2.15

asterisk asterisk 1.2.16

asterisk asterisk 1.2.22

asterisk asterisk 1.2.23

asterisk asterisk 1.2.28

asterisk asterisk 1.2.28.1

asterisk asterisk 1.2.7.1

asterisk asterisk 1.2.8

asterisk asterisk 1.4.13

asterisk asterisk 1.4.14

asterisk asterisk 1.4.18.1

asterisk asterisk 1.4.19

asterisk asterisk 1.4.8

asterisk asterisk 1.4.9

Exploits

source: wwwsecurityfocuscom/bid/30321/info Asterisk is prone to a remote denial-of-service vulnerability because it fails to handle multiple 'POKE' requests in quick succession Attackers can exploit this issue by sending a persistent stream of 'POKE' requests that will consume processor resources and deny service to legitimate users N ...