Lucene search

K
cveMitreCVE-2008-2119
HistoryJun 04, 2008 - 7:32 p.m.

CVE-2008-2119

2008-06-0419:32:00
CWE-20
mitre
web.nvd.nist.gov
40
asterisk
open source
denial of service
vulnerability
sip
invite
cve-2008-2119
nvd
security
remote attackers

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

AI Score

6.3

Confidence

Low

EPSS

0.013

Percentile

86.1%

Asterisk Open Source 1.0.x and 1.2.x before 1.2.29 and Business Edition A.x.x and B.x.x before B.2.5.3, when pedantic parsing (aka pedanticsipchecking) is enabled, allows remote attackers to cause a denial of service (daemon crash) via a SIP INVITE message that lacks a From header, related to invocations of the ast_uri_decode function, and improper handling of (1) an empty const string and (2) a NULL pointer.

Affected configurations

Nvd
Node
asteriskasterisk_business_editionRange≀b2.5.2
OR
asteriskasterisk_business_editionMatchb.1.3.2
OR
asteriskasterisk_business_editionMatchb.1.3.3
OR
asteriskasterisk_business_editionMatchb.2.2.0
OR
asteriskasterisk_business_editionMatchb.2.2.1
OR
asteriskasterisk_business_editionMatchb.2.3.1
OR
asteriskasterisk_business_editionMatchb.2.3.2
OR
asteriskasterisk_business_editionMatchb.2.3.3
OR
asteriskasterisk_business_editionMatchb.2.3.4
OR
asteriskasterisk_business_editionMatchb.2.5.0
OR
asteriskasterisk_business_editionMatchb2.5.1
OR
asteriskopen_sourceRange≀1.2.28
OR
asteriskopen_sourceMatch1.0
OR
asteriskopen_sourceMatch1.0.0
OR
asteriskopen_sourceMatch1.0.1
OR
asteriskopen_sourceMatch1.0.2
OR
asteriskopen_sourceMatch1.0.3
OR
asteriskopen_sourceMatch1.0.4
OR
asteriskopen_sourceMatch1.0.5
OR
asteriskopen_sourceMatch1.0.6
OR
asteriskopen_sourceMatch1.0.7
OR
asteriskopen_sourceMatch1.0.8
OR
asteriskopen_sourceMatch1.0.9
OR
asteriskopen_sourceMatch1.0.11
OR
asteriskopen_sourceMatch1.0.11.1
OR
asteriskopen_sourceMatch1.0.12
OR
asteriskopen_sourceMatch1.2.0
OR
asteriskopen_sourceMatch1.2.0beta1
OR
asteriskopen_sourceMatch1.2.0beta2
OR
asteriskopen_sourceMatch1.2.1
OR
asteriskopen_sourceMatch1.2.2
OR
asteriskopen_sourceMatch1.2.10
OR
asteriskopen_sourceMatch1.2.11
OR
asteriskopen_sourceMatch1.2.12
OR
asteriskopen_sourceMatch1.2.12.1
OR
asteriskopen_sourceMatch1.2.13
OR
asteriskopen_sourceMatch1.2.14
OR
asteriskopen_sourceMatch1.2.15
OR
asteriskopen_sourceMatch1.2.16
OR
asteriskopen_sourceMatch1.2.17
OR
asteriskopen_sourceMatch1.2.18
OR
asteriskopen_sourceMatch1.2.19
OR
asteriskopen_sourceMatch1.2.20
OR
asteriskopen_sourceMatch1.2.21
OR
asteriskopen_sourceMatch1.2.21.1
OR
asteriskopen_sourceMatch1.2.22
OR
asteriskopen_sourceMatch1.2.23
OR
asteriskopen_sourceMatch1.2.24
OR
asteriskopen_sourceMatch1.2.25
OR
asteriskopen_sourceMatch1.2.26
OR
asteriskopen_sourceMatch1.2.26.1
OR
asteriskopen_sourceMatch1.2.26.2
OR
asteriskopen_sourceMatch1.2.27
VendorProductVersionCPE
asteriskasterisk_business_edition*cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*
asteriskasterisk_business_editionb.1.3.2cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.2:*:*:*:*:*:*:*
asteriskasterisk_business_editionb.1.3.3cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.3:*:*:*:*:*:*:*
asteriskasterisk_business_editionb.2.2.0cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.0:*:*:*:*:*:*:*
asteriskasterisk_business_editionb.2.2.1cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.1:*:*:*:*:*:*:*
asteriskasterisk_business_editionb.2.3.1cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.1:*:*:*:*:*:*:*
asteriskasterisk_business_editionb.2.3.2cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.2:*:*:*:*:*:*:*
asteriskasterisk_business_editionb.2.3.3cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.3:*:*:*:*:*:*:*
asteriskasterisk_business_editionb.2.3.4cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.4:*:*:*:*:*:*:*
asteriskasterisk_business_editionb.2.5.0cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.0:*:*:*:*:*:*:*
Rows per page:
1-10 of 531

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

AI Score

6.3

Confidence

Low

EPSS

0.013

Percentile

86.1%