Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2008-1289


Multiple buffer overflows in Asterisk Open Source 1.4.x before 1.4.18.1 and 1.4.19-rc3, Open Source 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6.1, AsteriskNOW 1.0.x before 1.0.2, Appliance Developer Kit before 1.4 revision 109386, and s800i 1.1.x before 1.1.0.2 allow remote attackers to (1) write a zero to an arbitrary memory location via a large RTP payload number, related to the ast_rtp_unset_m_type function in main/rtp.c; or (2) write certain integers to an arbitrary memory location via a large number of RTP payloads, related to the process_sdp function in channels/chan_sip.c.


Published

2008-03-24T17:44:00.000

Last Modified

2025-04-09T00:30:58.490

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-119

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application asterisk asterisk_appliance_developer_kit 1.4 Yes
Application asterisk asterisk_business_edition ≤ c.1.0-beta8 Yes
Application asterisk asterisk_business_edition ≤ c.1.0beta7 Yes
Application asterisk asterisknow ≤ 1.0.1 Yes
Application asterisk open_source ≤ 1.4.18 Yes
Application asterisk open_source ≤ 1.4.19 Yes
Application asterisk open_source ≤ 1.6.0_beta5 Yes
Application asterisk s800i ≤ 1.1.0.1 Yes

References