This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Asterisk First view 2007-12-19
Product Asterisk Business Edition Last view 2009-01-14
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta7:*:*:*:*:*:*:* 9
cpe:2.3:a:asterisk:asterisk_business_edition:c:*:*:*:*:*:*:* 8
cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta8:*:*:*:*:*:*:* 8
cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0beta7:*:*:*:*:*:*:* 8
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.4:*:*:*:*:*:*:* 8
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.2:*:*:*:*:*:*:* 7
cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.2:*:*:*:*:*:*:* 7
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.0:*:*:*:*:*:*:* 7
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.1:*:*:*:*:*:*:* 7
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.0:*:*:*:*:*:*:* 7
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.3:*:*:*:*:*:*:* 7
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.1:*:*:*:*:*:*:* 7
cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.3:*:*:*:*:*:*:* 7
cpe:2.3:a:asterisk:asterisk_business_edition:b:*:*:*:*:*:*:* 6
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.5:*:*:*:*:*:*:* 6
cpe:2.3:a:asterisk:asterisk_business_edition:c1.8.1:*:*:*:*:*:*:* 6
cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6.2:*:*:*:*:*:*:* 6
cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6:*:*:*:*:*:*:* 6
cpe:2.3:a:asterisk:asterisk_business_edition:c1.8.0:*:*:*:*:*:*:* 6
cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6.1:*:*:*:*:*:*:* 6
cpe:2.3:a:asterisk:asterisk_business_edition:a:*:*:*:*:*:*:* 6
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.6:*:*:*:*:*:*:* 6
cpe:2.3:a:asterisk:asterisk_business_edition:b2.5.1:*:*:*:*:*:*:* 5
cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0:beta7:*:*:*:*:*:* 5
cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0:beta8:*:*:*:*:*:* 5
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.1:*:*:*:*:*:*:* 5
cpe:2.3:a:asterisk:asterisk_business_edition:b2.5.2:*:*:*:*:*:*:* 3
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.3:*:*:*:*:*:*:* 3

Related : CVE

  Date Alert Description
5 2009-01-14 CVE-2009-0041

IAX2 in Asterisk Open Source 1.2.x before 1.2.31, 1.4.x before 1.4.23-rc4, and 1.6.x before 1.6.0.3-rc2; Business Edition A.x.x, B.x.x before B.2.5.7, C.1.x.x before C.1.10.4, and C.2.x.x before C.2.1.2.1; and s800i 1.2.x before 1.3.0 responds differently to a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.

4.3 2008-12-17 CVE-2008-5558

Asterisk Open Source 1.2.26 through 1.2.30.3 and Business Edition B.2.3.5 through B.2.5.5, when realtime IAX2 users are enabled, allows remote attackers to cause a denial of service (crash) via authentication attempts involving (1) an unknown user or (2) a user using hostname matching.

7.8 2008-07-24 CVE-2008-3264

The FWDOWNL firmware-download implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (traffic amplification) via an IAX2 FWDOWNL request.

4.3 2008-06-04 CVE-2008-2119

Asterisk Open Source 1.0.x and 1.2.x before 1.2.29 and Business Edition A.x.x and B.x.x before B.2.5.3, when pedantic parsing (aka pedanticsipchecking) is enabled, allows remote attackers to cause a denial of service (daemon crash) via a SIP INVITE message that lacks a From header, related to invocations of the ast_uri_decode function, and improper handling of (1) an empty const string and (2) a NULL pointer.

7.1 2008-04-23 CVE-2008-1923

The IAX2 channel driver (chan_iax2) in Asterisk 1.2 before revision 72630 and 1.4 before revision 65679, when configured to allow unauthenticated calls, sends "early audio" to an unverified source IP address of a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed NEW message.

4.3 2008-04-23 CVE-2008-1897

The IAX2 channel driver (chan_iax2) in Asterisk Open Source 1.0.x, 1.2.x before 1.2.28, and 1.4.x before 1.4.19.1; Business Edition A.x.x, B.x.x before B.2.5.2, and C.x.x before C.1.8.1; AsteriskNOW before 1.0.3; Appliance Developer Kit 0.x.x; and s800i before 1.1.0.3, when configured to allow unauthenticated calls, does not verify that an ACK response contains a call number matching the server's reply to a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed ACK response that does not complete a 3-way handshake. NOTE: this issue exists because of an incomplete fix for CVE-2008-1923.

9.3 2008-03-24 CVE-2008-1390

The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses.

7.5 2008-03-24 CVE-2008-1289

Multiple buffer overflows in Asterisk Open Source 1.4.x before 1.4.18.1 and 1.4.19-rc3, Open Source 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6.1, AsteriskNOW 1.0.x before 1.0.2, Appliance Developer Kit before 1.4 revision 109386, and s800i 1.1.x before 1.1.0.2 allow remote attackers to (1) write a zero to an arbitrary memory location via a large RTP payload number, related to the ast_rtp_unset_m_type function in main/rtp.c; or (2) write certain integers to an arbitrary memory location via a large number of RTP payloads, related to the process_sdp function in channels/chan_sip.c.

8.8 2008-03-19 CVE-2008-1332

Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header.

5 2008-01-07 CVE-2008-0095

The SIP channel driver in Asterisk Open Source 1.4.x before 1.4.17, Business Edition before C.1.0-beta8, AsteriskNOW before beta7, Appliance Developer Kit before Asterisk 1.4 revision 95946, and Appliance s800i 1.0.x before 1.0.3.4 allows remote attackers to cause a denial of service (daemon crash) via a BYE message with an Also (Also transfer) header, which triggers a NULL pointer dereference.

4.3 2007-12-19 CVE-2007-6430

Asterisk Open Source 1.2.x before 1.2.26 and 1.4.x before 1.4.16, and Business Edition B.x.x before B.2.3.6 and C.x.x before C.1.0-beta8, when using database-based registrations ("realtime") and host-based authentication, does not check the IP address when the username is correct and there is no password, which allows remote attackers to bypass authentication using a valid username.

CWE : Common Weakness Enumeration

%idName
36% (4) CWE-287 Improper Authentication
9% (1) CWE-399 Resource Management Errors
9% (1) CWE-264 Permissions, Privileges, and Access Controls
9% (1) CWE-255 Credentials Management
9% (1) CWE-200 Information Exposure
9% (1) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
9% (1) CWE-20 Improper Input Validation
9% (1) CWE-16 Configuration

Oval Markup Language : Definitions

OvalID Name
oval:org.mitre.oval:def:7422 DSA-1563 asterisk -- programming error
oval:org.mitre.oval:def:20041 DSA-1563-1 asterisk - denial of service

Open Source Vulnerability Database (OSVDB)

id Description
51373 Asterisk IAX2 User Account Enumeration Weakness
50675 Asterisk IAX2 Realtime Hostname Handling User Authentication Remote DoS
47254 Asterisk IAX2 FWDOWNL Request Spoofing Remote DoS
46014 Asterisk Pedantic Parsing SIP INVITE Message Handling Remote DoS
44649 Asterisk Open Source IAX2 Channel Driver (chan_iax2) Spoofed ACK Response Han...
44648 Asterisk IAX2 Channel Driver (chan_iax2) Spoofed NEW Message Remote DoS
43416 Asterisk RTP Payload Handling Multiple Remote Overflows
43415 Asterisk SIP Channel Driver Unauthenticated Call Remote Privilege Escalation
43413 Asterisk HTTP Manager ID Prediction Weakness
39841 Asterisk BYE/Also Transfer Method DoS
39519 Asterisk Host Based Registration Database Security Bypass

OpenVAS Exploits

id Description
2009-12-30 Name : Debian Security Advisory DSA 1952-1 (asterisk)
File : nvt/deb_1952_1.nasl
2009-12-14 Name : Fedora Core 10 FEDORA-2009-12461 (asterisk)
File : nvt/fcore_2009_12461.nasl
2009-12-03 Name : Fedora Core 10 FEDORA-2009-11126 (asterisk)
File : nvt/fcore_2009_11126.nasl
2009-09-28 Name : Fedora Core 10 FEDORA-2009-9374 (asterisk)
File : nvt/fcore_2009_9374.nasl
2009-05-05 Name : Gentoo Security Advisory GLSA 200905-01 (asterisk)
File : nvt/glsa_200905_01.nasl
2009-02-17 Name : Fedora Update for asterisk FEDORA-2008-0199
File : nvt/gb_fedora_2008_0199_asterisk_fc8.nasl
2009-02-17 Name : Fedora Update for asterisk FEDORA-2008-6853
File : nvt/gb_fedora_2008_6853_asterisk_fc9.nasl
2009-02-17 Name : Fedora Update for asterisk FEDORA-2008-6676
File : nvt/gb_fedora_2008_6676_asterisk_fc8.nasl
2009-02-17 Name : Fedora Update for asterisk FEDORA-2008-3390
File : nvt/gb_fedora_2008_3390_asterisk_fc8.nasl
2009-02-17 Name : Fedora Update for asterisk FEDORA-2008-3365
File : nvt/gb_fedora_2008_3365_asterisk_fc7.nasl
2009-02-17 Name : Fedora Update for asterisk FEDORA-2008-0198
File : nvt/gb_fedora_2008_0198_asterisk_fc7.nasl
2009-02-16 Name : Fedora Update for asterisk FEDORA-2008-2554
File : nvt/gb_fedora_2008_2554_asterisk_fc8.nasl
2009-02-16 Name : Fedora Update for asterisk FEDORA-2008-2620
File : nvt/gb_fedora_2008_2620_asterisk_fc7.nasl
2009-02-13 Name : Fedora Core 10 FEDORA-2009-0984 (asterisk)
File : nvt/fcore_2009_0984.nasl
2009-02-13 Name : Fedora Core 9 FEDORA-2009-0973 (asterisk)
File : nvt/fcore_2009_0973.nasl
2008-09-24 Name : Gentoo Security Advisory GLSA 200804-13 (asterisk)
File : nvt/glsa_200804_13.nasl
2008-05-12 Name : Debian Security Advisory DSA 1563-1 (asterisk)
File : nvt/deb_1563_1.nasl
2008-03-27 Name : Debian Security Advisory DSA 1525-1 (asterisk)
File : nvt/deb_1525_1.nasl

Snort® IPS/IDS

Date Description
2015-03-17 Digium Asterisk SIP channel driver denial of service attempt
RuleID : 33445 - Type : PROTOCOL-VOIP - Revision : 2
2014-01-10 Digium Asterisk Attribute header rtpmap field buffer overflow attempt
RuleID : 20392 - Type : PROTOCOL-VOIP - Revision : 10
2014-01-10 Digium Asterisk Attribute header rtpmap field buffer overflow attempt
RuleID : 20391 - Type : PROTOCOL-VOIP - Revision : 10
2014-01-10 Attribute header rtpmap field invalid payload type
RuleID : 20390 - Type : PROTOCOL-VOIP - Revision : 9
2014-01-10 Digium Asterisk IAX2 ack response denial of service attempt
RuleID : 16445 - Type : PROTOCOL-VOIP - Revision : 11
2014-01-10 Attribute header rtpmap field invalid payload type
RuleID : 13693 - Type : PROTOCOL-VOIP - Revision : 12

Nessus® Vulnerability Scanner

id Description
2010-02-24 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-1952.nasl - Type: ACT_GATHER_INFO
2009-05-04 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-200905-01.nasl - Type: ACT_GATHER_INFO
2009-04-23 Name: The remote Fedora host is missing a security update.
File: fedora_2009-0984.nasl - Type: ACT_GATHER_INFO
2009-02-13 Name: The remote Fedora host is missing one or more security updates.
File: fedora_2009-0973.nasl - Type: ACT_GATHER_INFO
2008-08-15 Name: The remote openSUSE host is missing a security update.
File: suse_asterisk-5524.nasl - Type: ACT_GATHER_INFO
2008-07-31 Name: The remote Fedora host is missing a security update.
File: fedora_2008-6853.nasl - Type: ACT_GATHER_INFO
2008-07-24 Name: The remote VoIP service can be abused to conduct an amplification attack agai...
File: asterisk_iax2_spoofed_fwdownl.nasl - Type: ACT_ATTACK
2008-07-24 Name: The remote Fedora host is missing a security update.
File: fedora_2008-6676.nasl - Type: ACT_GATHER_INFO
2008-05-07 Name: It is possible to bypass authentication and make calls using the remote VoIP ...
File: asterisk_sip_auth_bypass.nasl - Type: ACT_ATTACK
2008-05-06 Name: The remote VoIP service can be abused to conduct an amplification attack agai...
File: asterisk_iax2_spoofed_handshake.nasl - Type: ACT_ATTACK
2008-05-02 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-1563.nasl - Type: ACT_GATHER_INFO
2008-05-01 Name: The remote Fedora host is missing a security update.
File: fedora_2008-3365.nasl - Type: ACT_GATHER_INFO
2008-05-01 Name: The remote Fedora host is missing a security update.
File: fedora_2008-3390.nasl - Type: ACT_GATHER_INFO
2008-04-17 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-200804-13.nasl - Type: ACT_GATHER_INFO
2008-04-17 Name: The remote openSUSE host is missing a security update.
File: suse_asterisk-5169.nasl - Type: ACT_GATHER_INFO
2008-03-26 Name: The remote Fedora host is missing a security update.
File: fedora_2008-2620.nasl - Type: ACT_GATHER_INFO
2008-03-26 Name: The remote Fedora host is missing a security update.
File: fedora_2008-2554.nasl - Type: ACT_GATHER_INFO
2008-03-21 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-1525.nasl - Type: ACT_GATHER_INFO
2008-03-07 Name: The remote openSUSE host is missing a security update.
File: suse_asterisk-5062.nasl - Type: ACT_GATHER_INFO
2008-01-04 Name: The remote Fedora host is missing a security update.
File: fedora_2008-0199.nasl - Type: ACT_GATHER_INFO
2008-01-04 Name: The remote Fedora host is missing a security update.
File: fedora_2008-0198.nasl - Type: ACT_GATHER_INFO