This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Asterisk First view 2008-01-07
Product Open Source Last view 2020-11-06
Version 1.2.20 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:asterisk:open_source

Activity : Overall

Related : CVE

  Date Alert Description
5.3 2020-11-06 CVE-2020-28327

A res_pjsip_session crash was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1. and Certified Asterisk before 16.8-cert5. Upon receiving a new SIP Invite, Asterisk did not return the created dialog locked or referenced. This caused a gap between the creation of the dialog object, and its next use by the thread that created it. Depending on some off-nominal circumstances and timing, it was possible for another thread to free said dialog in this gap. Asterisk could then crash when the dialog object, or any of its dependent objects, were dereferenced or accessed next by the initial-creation thread. Note, however, that this crash can only occur when using a connection-oriented protocol (e.g., TCP or TLS, but not UDP) for SIP transport. Also, the remote client must be authenticated, or Asterisk must be configured for anonymous calling.

6.5 2020-11-06 CVE-2020-28242

An issue was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1 and Certified Asterisk before 16.8-cert5. If Asterisk is challenged on an outbound INVITE and the nonce is changed in each response, Asterisk will continually send INVITEs in a loop. This causes Asterisk to consume more and more memory since the transaction will never terminate (even if the call is hung up), ultimately leading to a restart or shutdown of Asterisk. Outbound authentication must be configured on the endpoint for this to occur.

7.5 2019-10-29 CVE-2009-3723

asterisk allows calls on prohibited networks

6.5 2018-06-12 CVE-2018-12228

An issue was discovered in Asterisk Open Source 15.x before 15.4.1. When connected to Asterisk via TCP/TLS, if the client abruptly disconnects, or sends a specially crafted message, then Asterisk gets caught in an infinite loop while trying to read the data stream. This renders the system unusable.

9 2012-08-31 CVE-2012-2186

Incomplete blacklist vulnerability in main/manager.c in Asterisk Open Source 1.8.x before 1.8.15.1 and 10.x before 10.7.1, Certified Asterisk 1.8.11 before 1.8.11-cert6, Asterisk Digiumphones 10.x.x-digiumphones before 10.7.1-digiumphones, and Asterisk Business Edition C.3.x before C.3.7.6 allows remote authenticated users to execute arbitrary commands by leveraging originate privileges and providing an ExternalIVR value in an AMI Originate action.

4 2012-06-02 CVE-2012-2948

chan_skinny.c in the Skinny (aka SCCP) channel driver in Certified Asterisk 1.8.11-cert before 1.8.11-cert2 and Asterisk Open Source 1.8.x before 1.8.12.1 and 10.x before 10.4.1 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by closing a connection in off-hook mode.

7.8 2009-09-08 CVE-2009-2346

The IAX2 protocol implementation in Asterisk Open Source 1.2.x before 1.2.35, 1.4.x before 1.4.26.2, 1.6.0.x before 1.6.0.15, and 1.6.1.x before 1.6.1.6; Business Edition B.x.x before B.2.5.10, C.2.x before C.2.4.3, and C.3.x before C.3.1.1; and s800i 1.3.x before 1.3.0.3 allows remote attackers to cause a denial of service (call-number exhaustion) by initiating many IAX2 message exchanges, a related issue to CVE-2008-3263.

7.8 2009-08-12 CVE-2009-2726

The SIP channel driver in Asterisk Open Source 1.2.x before 1.2.34, 1.4.x before 1.4.26.1, 1.6.0.x before 1.6.0.12, and 1.6.1.x before 1.6.1.4; Asterisk Business Edition A.x.x, B.x.x before B.2.5.9, C.2.x before C.2.4.1, and C.3.x before C.3.1; and Asterisk Appliance s800i 1.2.x before 1.3.0.3 does not use a maximum width when invoking sscanf style functions, which allows remote attackers to cause a denial of service (stack memory consumption) via SIP packets containing large sequences of ASCII decimal characters, as demonstrated via vectors related to (1) the CSeq value in a SIP header, (2) large Content-Length value, and (3) SDP.

5 2009-01-14 CVE-2009-0041

IAX2 in Asterisk Open Source 1.2.x before 1.2.31, 1.4.x before 1.4.23-rc4, and 1.6.x before 1.6.0.3-rc2; Business Edition A.x.x, B.x.x before B.2.5.7, C.1.x.x before C.1.10.4, and C.2.x.x before C.2.1.2.1; and s800i 1.2.x before 1.3.0 responds differently to a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.

7.8 2008-07-24 CVE-2008-3264

The FWDOWNL firmware-download implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (traffic amplification) via an IAX2 FWDOWNL request.

4.3 2008-06-04 CVE-2008-2119

Asterisk Open Source 1.0.x and 1.2.x before 1.2.29 and Business Edition A.x.x and B.x.x before B.2.5.3, when pedantic parsing (aka pedanticsipchecking) is enabled, allows remote attackers to cause a denial of service (daemon crash) via a SIP INVITE message that lacks a From header, related to invocations of the ast_uri_decode function, and improper handling of (1) an empty const string and (2) a NULL pointer.

7.1 2008-04-23 CVE-2008-1923

The IAX2 channel driver (chan_iax2) in Asterisk 1.2 before revision 72630 and 1.4 before revision 65679, when configured to allow unauthenticated calls, sends "early audio" to an unverified source IP address of a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed NEW message.

4.3 2008-04-23 CVE-2008-1897

The IAX2 channel driver (chan_iax2) in Asterisk Open Source 1.0.x, 1.2.x before 1.2.28, and 1.4.x before 1.4.19.1; Business Edition A.x.x, B.x.x before B.2.5.2, and C.x.x before C.1.8.1; AsteriskNOW before 1.0.3; Appliance Developer Kit 0.x.x; and s800i before 1.1.0.3, when configured to allow unauthenticated calls, does not verify that an ACK response contains a call number matching the server's reply to a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed ACK response that does not complete a 3-way handshake. NOTE: this issue exists because of an incomplete fix for CVE-2008-1923.

7.5 2008-03-24 CVE-2008-1289

Multiple buffer overflows in Asterisk Open Source 1.4.x before 1.4.18.1 and 1.4.19-rc3, Open Source 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6.1, AsteriskNOW 1.0.x before 1.0.2, Appliance Developer Kit before 1.4 revision 109386, and s800i 1.1.x before 1.1.0.2 allow remote attackers to (1) write a zero to an arbitrary memory location via a large RTP payload number, related to the ast_rtp_unset_m_type function in main/rtp.c; or (2) write certain integers to an arbitrary memory location via a large number of RTP payloads, related to the process_sdp function in channels/chan_sip.c.

8.8 2008-03-19 CVE-2008-1332

Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header.

5 2008-01-07 CVE-2008-0095

The SIP channel driver in Asterisk Open Source 1.4.x before 1.4.17, Business Edition before C.1.0-beta8, AsteriskNOW before beta7, Appliance Developer Kit before Asterisk 1.4 revision 95946, and Appliance s800i 1.0.x before 1.0.3.4 allows remote attackers to cause a denial of service (daemon crash) via a BYE message with an Also (Also transfer) header, which triggers a NULL pointer dereference.

CWE : Common Weakness Enumeration

%idName
23% (3) CWE-399 Resource Management Errors
15% (2) CWE-287 Improper Authentication
15% (2) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
7% (1) CWE-674 Uncontrolled Recursion
7% (1) CWE-404 Improper Resource Shutdown or Release
7% (1) CWE-264 Permissions, Privileges, and Access Controls
7% (1) CWE-200 Information Exposure
7% (1) CWE-20 Improper Input Validation
7% (1) CWE-16 Configuration

CAPEC : Common Attack Pattern Enumeration & Classification

id Name
CAPEC-2 Inducing Account Lockout
CAPEC-82 Violating Implicit Assumptions Regarding XML Content (aka XML Denial of Servi...
CAPEC-99 XML Parser Attack
CAPEC-119 Resource Depletion
CAPEC-121 Locate and Exploit Test APIs
CAPEC-125 Resource Depletion through Flooding
CAPEC-130 Resource Depletion through Allocation
CAPEC-147 XML Ping of Death
CAPEC-197 XEE (XML Entity Expansion)
CAPEC-227 Denial of Service through Resource Depletion
CAPEC-228 Resource Depletion through DTD Injection in a SOAP Message
CAPEC-229 XML Attribute Blowup

Open Source Vulnerability Database (OSVDB)

id Description
57762 Asterisk IAX2 Call Number Resource Exhaustion Remote DoS
56991 Asterisk Multiple Function Maximum Width Handling Remote DoS
51373 Asterisk IAX2 User Account Enumeration Weakness
47254 Asterisk IAX2 FWDOWNL Request Spoofing Remote DoS
46014 Asterisk Pedantic Parsing SIP INVITE Message Handling Remote DoS
44649 Asterisk Open Source IAX2 Channel Driver (chan_iax2) Spoofed ACK Response Han...
44648 Asterisk IAX2 Channel Driver (chan_iax2) Spoofed NEW Message Remote DoS
43416 Asterisk RTP Payload Handling Multiple Remote Overflows
43415 Asterisk SIP Channel Driver Unauthenticated Call Remote Privilege Escalation
39841 Asterisk BYE/Also Transfer Method DoS

OpenVAS Exploits

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2012-10-03 Name : Gentoo Security Advisory GLSA 201209-15 (asterisk)
File : nvt/glsa_201209_15.nasl
2012-10-03 Name : Debian Security Advisory DSA 2550-2 (asterisk)
File : nvt/deb_2550_2.nasl
2012-09-23 Name : Debian Security Advisory DSA 2550-1 (asterisk)
File : nvt/deb_2550_1.nasl
2012-09-22 Name : Fedora Update for asterisk FEDORA-2012-13338
File : nvt/gb_fedora_2012_13338_asterisk_fc17.nasl
2012-09-22 Name : Fedora Update for asterisk FEDORA-2012-13437
File : nvt/gb_fedora_2012_13437_asterisk_fc16.nasl
2012-08-30 Name : FreeBSD Ports: asterisk
File : nvt/freebsd_asterisk2.nasl
2012-08-10 Name : Debian Security Advisory DSA 2493-1 (asterisk)
File : nvt/deb_2493_1.nasl
2012-08-10 Name : FreeBSD Ports: asterisk10
File : nvt/freebsd_asterisk10.nasl
2012-08-10 Name : Gentoo Security Advisory GLSA 201206-05 (Asterisk)
File : nvt/glsa_201206_05.nasl
2012-05-31 Name : FreeBSD Ports: asterisk16
File : nvt/freebsd_asterisk161.nasl
2011-03-09 Name : Gentoo Security Advisory GLSA 201006-20 (asterisk)
File : nvt/glsa_201006_20.nasl
2009-12-30 Name : Debian Security Advisory DSA 1952-1 (asterisk)
File : nvt/deb_1952_1.nasl
2009-12-14 Name : Fedora Core 10 FEDORA-2009-12461 (asterisk)
File : nvt/fcore_2009_12461.nasl
2009-12-03 Name : Fedora Core 10 FEDORA-2009-11126 (asterisk)
File : nvt/fcore_2009_11126.nasl
2009-09-28 Name : Fedora Core 10 FEDORA-2009-9374 (asterisk)
File : nvt/fcore_2009_9374.nasl
2009-09-28 Name : Fedora Core 11 FEDORA-2009-9405 (asterisk)
File : nvt/fcore_2009_9405.nasl
2009-09-18 Name : Asterisk IAX2 Call Number Exhaustion DOS Vulnerability (Linux)
File : nvt/secpod_asterisk_iax2_call_number_dos_vuln.nasl
2009-09-02 Name : Asterisk SIP Channel Driver Denial Of Service Vulnerability (Linux)
File : nvt/secpod_asterisk_sip_channel_driver_dos_vuln.nasl
2009-05-05 Name : Gentoo Security Advisory GLSA 200905-01 (asterisk)
File : nvt/glsa_200905_01.nasl
2009-02-17 Name : Fedora Update for asterisk FEDORA-2008-0199
File : nvt/gb_fedora_2008_0199_asterisk_fc8.nasl
2009-02-17 Name : Fedora Update for asterisk FEDORA-2008-6853
File : nvt/gb_fedora_2008_6853_asterisk_fc9.nasl
2009-02-17 Name : Fedora Update for asterisk FEDORA-2008-6676
File : nvt/gb_fedora_2008_6676_asterisk_fc8.nasl
2009-02-17 Name : Fedora Update for asterisk FEDORA-2008-3390
File : nvt/gb_fedora_2008_3390_asterisk_fc8.nasl
2009-02-17 Name : Fedora Update for asterisk FEDORA-2008-3365
File : nvt/gb_fedora_2008_3365_asterisk_fc7.nasl
2009-02-17 Name : Fedora Update for asterisk FEDORA-2008-0198
File : nvt/gb_fedora_2008_0198_asterisk_fc7.nasl

Snort® IPS/IDS

Date Description
2015-03-17 Digium Asterisk SIP channel driver denial of service attempt
RuleID : 33445 - Type : PROTOCOL-VOIP - Revision : 2
2014-01-10 Digium Asterisk IAX2 call number denial of service
RuleID : 21608 - Type : PROTOCOL-VOIP - Revision : 4
2014-01-10 Digium Asterisk Attribute header rtpmap field buffer overflow attempt
RuleID : 20392 - Type : PROTOCOL-VOIP - Revision : 10
2014-01-10 Digium Asterisk Attribute header rtpmap field buffer overflow attempt
RuleID : 20391 - Type : PROTOCOL-VOIP - Revision : 10
2014-01-10 Attribute header rtpmap field invalid payload type
RuleID : 20390 - Type : PROTOCOL-VOIP - Revision : 9
2014-01-10 Digium Asterisk IAX2 ack response denial of service attempt
RuleID : 16445 - Type : PROTOCOL-VOIP - Revision : 11
2014-01-10 CSeq buffer overflow attempt
RuleID : 16351 - Type : PROTOCOL-VOIP - Revision : 11
2014-01-10 Digium Asterisk SIP sscanf denial of service attempt
RuleID : 16212 - Type : DOS - Revision : 2
2014-01-10 Digium Asterisk SIP sscanf denial of service attempt
RuleID : 16211 - Type : DOS - Revision : 2
2014-01-10 Digium Asterisk SIP sscanf denial of service attempt
RuleID : 16210 - Type : DOS - Revision : 2
2014-01-10 Attribute header rtpmap field invalid payload type
RuleID : 13693 - Type : PROTOCOL-VOIP - Revision : 12
2014-01-10 CSeq buffer overflow attempt
RuleID : 11971 - Type : PROTOCOL-VOIP - Revision : 8

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2018-06-15 Name: A telephony application running on the remote host is affected by multiple vu...
File: asterisk_ast_15_x_2018_007-008.nasl - Type: ACT_GATHER_INFO
2012-09-27 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201209-15.nasl - Type: ACT_GATHER_INFO
2012-09-19 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-2550.nasl - Type: ACT_GATHER_INFO
2012-09-18 Name: The remote Fedora host is missing a security update.
File: fedora_2012-13437.nasl - Type: ACT_GATHER_INFO
2012-09-18 Name: The remote Fedora host is missing a security update.
File: fedora_2012-13338.nasl - Type: ACT_GATHER_INFO
2012-09-18 Name: The remote Fedora host is missing a security update.
File: fedora_2012-13286.nasl - Type: ACT_GATHER_INFO
2012-09-06 Name: A telephony application running on the remote host is affected by a security ...
File: asterisk_ast_2012_012.nasl - Type: ACT_GATHER_INFO
2012-08-31 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_4c53f007f2ed11e1a21514dae9ebcf89.nasl - Type: ACT_GATHER_INFO
2012-06-29 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-2493.nasl - Type: ACT_GATHER_INFO
2012-06-21 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201206-05.nasl - Type: ACT_GATHER_INFO
2012-06-14 Name: A telephony application running on the remote host is affected by a denial of...
File: asterisk_ast_2012_008.nasl - Type: ACT_GATHER_INFO
2012-05-30 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_359f615da9e111e18a6614dae9ebcf89.nasl - Type: ACT_GATHER_INFO
2010-06-04 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201006-20.nasl - Type: ACT_GATHER_INFO
2010-02-24 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-1952.nasl - Type: ACT_GATHER_INFO
2009-09-28 Name: The remote Fedora host is missing a security update.
File: fedora_2009-9374.nasl - Type: ACT_GATHER_INFO
2009-09-28 Name: The remote Fedora host is missing a security update.
File: fedora_2009-9405.nasl - Type: ACT_GATHER_INFO
2009-09-08 Name: The remote VoIP service is susceptible to a denial of service attack.
File: asterisk_iax2_call_number_dos.nasl - Type: ACT_GATHER_INFO
2009-05-04 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-200905-01.nasl - Type: ACT_GATHER_INFO
2009-04-23 Name: The remote Fedora host is missing a security update.
File: fedora_2009-0984.nasl - Type: ACT_GATHER_INFO
2009-02-13 Name: The remote Fedora host is missing one or more security updates.
File: fedora_2009-0973.nasl - Type: ACT_GATHER_INFO
2008-08-15 Name: The remote openSUSE host is missing a security update.
File: suse_asterisk-5524.nasl - Type: ACT_GATHER_INFO
2008-07-31 Name: The remote Fedora host is missing a security update.
File: fedora_2008-6853.nasl - Type: ACT_GATHER_INFO
2008-07-24 Name: The remote Fedora host is missing a security update.
File: fedora_2008-6676.nasl - Type: ACT_GATHER_INFO
2008-07-24 Name: The remote VoIP service can be abused to conduct an amplification attack agai...
File: asterisk_iax2_spoofed_fwdownl.nasl - Type: ACT_ATTACK
2008-05-07 Name: It is possible to bypass authentication and make calls using the remote VoIP ...
File: asterisk_sip_auth_bypass.nasl - Type: ACT_ATTACK