Executive Summary

Informations
NameCVE-2008-2119First vendor Publication2008-06-04
VendorCveLast vendor Modification2018-10-11

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:N/A:P)
Cvss Base Score4.3Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Asterisk Open Source 1.0.x and 1.2.x before 1.2.29 and Business Edition A.x.x and B.x.x before B.2.5.3, when pedantic parsing (aka pedanticsipchecking) is enabled, allows remote attackers to cause a denial of service (daemon crash) via a SIP INVITE message that lacks a From header, related to invocations of the ast_uri_decode function, and improper handling of (1) an empty const string and (2) a NULL pointer.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2119

CWE : Common Weakness Enumeration

%idName
100 %CWE-20Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Application27
Application91

OpenVAS Exploits

DateDescription
2009-05-05Name : Gentoo Security Advisory GLSA 200905-01 (asterisk)
File : nvt/glsa_200905_01.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
46014Asterisk Pedantic Parsing SIP INVITE Message Handling Remote DoS

Nessus® Vulnerability Scanner

DateDescription
2009-05-04Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200905-01.nasl - Type : ACT_GATHER_INFO
2008-08-15Name : The remote openSUSE host is missing a security update.
File : suse_asterisk-5524.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

SourceUrl
BUGTRAQ http://www.securityfocus.com/archive/1/493020/100/0/threaded
CONFIRM http://bugs.digium.com/view.php?id=12607
http://downloads.digium.com/pub/security/AST-2008-008.html
http://svn.digium.com/view/asterisk?view=rev&revision=120109
EXPLOIT-DB https://www.exploit-db.com/exploits/5749
GENTOO http://security.gentoo.org/glsa/glsa-200905-01.xml
SECTRACK http://www.securitytracker.com/id?1020166
VUPEN http://www.vupen.com/english/advisories/2008/1731
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/42823

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
DateInformations
2018-10-12 00:20:20
  • Multiple Updates
2017-09-29 09:23:32
  • Multiple Updates
2017-08-08 09:24:04
  • Multiple Updates
2016-04-26 17:22:43
  • Multiple Updates
2014-02-17 10:44:53
  • Multiple Updates
2013-05-11 00:16:27
  • Multiple Updates