Vulnerability CVE-2008-1897


Published: 2008-04-23   Modified: 2012-02-12

Description:
The IAX2 channel driver (chan_iax2) in Asterisk Open Source 1.0.x, 1.2.x before 1.2.28, and 1.4.x before 1.4.19.1; Business Edition A.x.x, B.x.x before B.2.5.2, and C.x.x before C.1.8.1; AsteriskNOW before 1.0.3; Appliance Developer Kit 0.x.x; and s800i before 1.1.0.3, when configured to allow unauthenticated calls, does not verify that an ACK response contains a call number matching the server's reply to a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed ACK response that does not complete a 3-way handshake. NOTE: this issue exists because of an incomplete fix for CVE-2008-1923.

Type:

CWE-287

(Improper Authentication)

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
Asterisk -> Asterisk appliance developer kit 
Asterisk -> Asterisk business edition 
Asterisk -> Asterisknow 
Asterisk -> Open source 
Asterisk -> S800i 

 References:
http://bugs.digium.com/view.php?id=10078
http://downloads.digium.com/pub/security/AST-2008-006.html
http://security.gentoo.org/glsa/glsa-200905-01.xml
http://www.altsci.com/concepts/page.php?s=asteri&p=2
http://www.debian.org/security/2008/dsa-1563
http://www.securityfocus.com/archive/1/491220/100/0/threaded
http://www.securityfocus.com/bid/28901
http://www.securitytracker.com/id?1019918
http://www.vupen.com/english/advisories/2008/1324
https://exchange.xforce.ibmcloud.com/vulnerabilities/41966
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00581.html
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00600.html

Copyright 2024, cxsecurity.com

 

Back to Top