Executive Summary

Informations
NameCVE-2008-1897First vendor Publication2008-04-23
VendorCveLast vendor Modification2018-10-11

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:N/A:P)
Cvss Base Score4.3Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

The IAX2 channel driver (chan_iax2) in Asterisk Open Source 1.0.x, 1.2.x before 1.2.28, and 1.4.x before 1.4.19.1; Business Edition A.x.x, B.x.x before B.2.5.2, and C.x.x before C.1.8.1; AsteriskNOW before 1.0.3; Appliance Developer Kit 0.x.x; and s800i before 1.1.0.3, when configured to allow unauthenticated calls, does not verify that an ACK response contains a call number matching the server's reply to a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed ACK response that does not complete a 3-way handshake. NOTE: this issue exists because of an incomplete fix for CVE-2008-1923.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1897

CWE : Common Weakness Enumeration

%idName
100 %CWE-287Improper Authentication

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:7422
 
Oval ID: oval:org.mitre.oval:def:7422
Title: DSA-1563 asterisk -- programming error
Description: Joel R. Voss discovered that the IAX2 module of Asterisk, a free software PBX and telephony toolkit performs insufficient validation of IAX2 protocol messages, which may lead to denial of service.
Family: unix Class: patch
Reference(s): DSA-1563
CVE-2008-1897
Version: 5
Platform(s): Debian GNU/Linux 4.0
Product(s): asterisk
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:20041
 
Oval ID: oval:org.mitre.oval:def:20041
Title: DSA-1563-1 asterisk - denial of service
Description: Joel R. Voss discovered that the IAX2 module of Asterisk, a free software PBX and telephony toolkit performs insufficient validation of IAX2 protocol messages, which may lead to denial of service.
Family: unix Class: patch
Reference(s): DSA-1563-1
CVE-2008-1897
Version: 5
Platform(s): Debian GNU/Linux 4.0
Product(s): asterisk
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application8
Application25
Application6
Application132
Application8

OpenVAS Exploits

DateDescription
2009-05-05Name : Gentoo Security Advisory GLSA 200905-01 (asterisk)
File : nvt/glsa_200905_01.nasl
2009-02-17Name : Fedora Update for asterisk FEDORA-2008-3365
File : nvt/gb_fedora_2008_3365_asterisk_fc7.nasl
2009-02-17Name : Fedora Update for asterisk FEDORA-2008-3390
File : nvt/gb_fedora_2008_3390_asterisk_fc8.nasl
2008-05-12Name : Debian Security Advisory DSA 1563-1 (asterisk)
File : nvt/deb_1563_1.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
44649Asterisk Open Source IAX2 Channel Driver (chan_iax2) Spoofed ACK Response Han...

Snort® IPS/IDS

DateDescription
2014-01-10Digium Asterisk IAX2 ack response denial of service attempt
RuleID : 16445 - Revision : 11 - Type : PROTOCOL-VOIP

Nessus® Vulnerability Scanner

DateDescription
2009-05-04Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200905-01.nasl - Type : ACT_GATHER_INFO
2008-08-15Name : The remote openSUSE host is missing a security update.
File : suse_asterisk-5524.nasl - Type : ACT_GATHER_INFO
2008-05-06Name : The remote VoIP service can be abused to conduct an amplification attack agai...
File : asterisk_iax2_spoofed_handshake.nasl - Type : ACT_ATTACK
2008-05-02Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1563.nasl - Type : ACT_GATHER_INFO
2008-05-01Name : The remote Fedora host is missing a security update.
File : fedora_2008-3365.nasl - Type : ACT_GATHER_INFO
2008-05-01Name : The remote Fedora host is missing a security update.
File : fedora_2008-3390.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

SourceUrl
BID http://www.securityfocus.com/bid/28901
BUGTRAQ http://www.securityfocus.com/archive/1/491220/100/0/threaded
CONFIRM http://bugs.digium.com/view.php?id=10078
http://downloads.digium.com/pub/security/AST-2008-006.html
DEBIAN http://www.debian.org/security/2008/dsa-1563
FEDORA https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00581.html
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00600.html
GENTOO http://security.gentoo.org/glsa/glsa-200905-01.xml
MISC http://www.altsci.com/concepts/page.php?s=asteri&p=2
SECTRACK http://www.securitytracker.com/id?1019918
VUPEN http://www.vupen.com/english/advisories/2008/1324
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/41966

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
DateInformations
2018-10-12 00:20:19
  • Multiple Updates
2017-08-08 09:24:02
  • Multiple Updates
2016-04-26 17:20:03
  • Multiple Updates
2014-02-17 10:44:45
  • Multiple Updates
2014-01-19 21:24:58
  • Multiple Updates
2013-05-11 00:15:42
  • Multiple Updates