Vulnerability CVE-2008-2119


Published: 2008-06-04   Modified: 2012-02-12

Description:
Asterisk Open Source 1.0.x and 1.2.x before 1.2.29 and Business Edition A.x.x and B.x.x before B.2.5.3, when pedantic parsing (aka pedanticsipchecking) is enabled, allows remote attackers to cause a denial of service (daemon crash) via a SIP INVITE message that lacks a From header, related to invocations of the ast_uri_decode function, and improper handling of (1) an empty const string and (2) a NULL pointer.

See advisories in our WLB2 database:
Topic
Author
Date
High
Remote Crash Vulnerability in SIP channel driver when run in pedantic mode
Asterisk Securit...
04.06.2008

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
Asterisk -> Asterisk business edition 
Asterisk -> Open source 

 References:
http://bugs.digium.com/view.php?id=12607
http://downloads.digium.com/pub/security/AST-2008-008.html
http://security.gentoo.org/glsa/glsa-200905-01.xml
http://svn.digium.com/view/asterisk?view=rev&revision=120109
http://www.securityfocus.com/archive/1/493020/100/0/threaded
http://www.securitytracker.com/id?1020166
http://www.vupen.com/english/advisories/2008/1731
https://exchange.xforce.ibmcloud.com/vulnerabilities/42823
https://www.exploit-db.com/exploits/5749

Copyright 2024, cxsecurity.com

 

Back to Top