Executive Summary

NameCVE-2009-2726First vendor Publication2009-08-12
VendorCveLast vendor Modification2018-10-10

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:C)
Cvss Base Score7.8Attack RangeNetwork
Cvss Impact Score6.9Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores


The SIP channel driver in Asterisk Open Source 1.2.x before 1.2.34, 1.4.x before, 1.6.0.x before, and 1.6.1.x before; Asterisk Business Edition A.x.x, B.x.x before B.2.5.9, C.2.x before C.2.4.1, and C.3.x before C.3.1; and Asterisk Appliance s800i 1.2.x before does not use a maximum width when invoking sscanf style functions, which allows remote attackers to cause a denial of service (stack memory consumption) via SIP packets containing large sequences of ASCII decimal characters, as demonstrated via vectors related to (1) the CSeq value in a SIP header, (2) large Content-Length value, and (3) SDP.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2726

CAPEC : Common Attack Pattern Enumeration & Classification

CAPEC-2Inducing Account Lockout
CAPEC-82Violating Implicit Assumptions Regarding XML Content (aka XML Denial of Servi...
CAPEC-99XML Parser Attack
CAPEC-119Resource Depletion
CAPEC-121Locate and Exploit Test APIs
CAPEC-125Resource Depletion through Flooding
CAPEC-130Resource Depletion through Allocation
CAPEC-147XML Ping of Death
CAPEC-197XEE (XML Entity Expansion)
CAPEC-227Denial of Service through Resource Depletion
CAPEC-228Resource Depletion through DTD Injection in a SOAP Message
CAPEC-229XML Attribute Blowup

CWE : Common Weakness Enumeration

100 %CWE-399Resource Management Errors

CPE : Common Platform Enumeration


OpenVAS Exploits

2011-03-09Name : Gentoo Security Advisory GLSA 201006-20 (asterisk)
File : nvt/glsa_201006_20.nasl
2009-09-28Name : Fedora Core 10 FEDORA-2009-9374 (asterisk)
File : nvt/fcore_2009_9374.nasl
2009-09-02Name : Asterisk SIP Channel Driver Denial Of Service Vulnerability (Linux)
File : nvt/secpod_asterisk_sip_channel_driver_dos_vuln.nasl

Open Source Vulnerability Database (OSVDB)

56991Asterisk Multiple Function Maximum Width Handling Remote DoS

Snort® IPS/IDS

2014-01-10CSeq buffer overflow attempt
RuleID : 16351 - Revision : 11 - Type : PROTOCOL-VOIP
2014-01-10Digium Asterisk SIP sscanf denial of service attempt
RuleID : 16212 - Revision : 2 - Type : DOS
2014-01-10Digium Asterisk SIP sscanf denial of service attempt
RuleID : 16211 - Revision : 2 - Type : DOS
2014-01-10Digium Asterisk SIP sscanf denial of service attempt
RuleID : 16210 - Revision : 2 - Type : DOS
2014-01-10CSeq buffer overflow attempt
RuleID : 11971 - Revision : 8 - Type : PROTOCOL-VOIP

Nessus® Vulnerability Scanner

2010-06-04Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201006-20.nasl - Type : ACT_GATHER_INFO
2009-09-28Name : The remote Fedora host is missing a security update.
File : fedora_2009-9374.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

BID http://www.securityfocus.com/bid/36015
BUGTRAQ http://www.securityfocus.com/archive/1/505669/100/0/threaded
CONFIRM http://downloads.digium.com/pub/security/AST-2009-005.html
MISC http://labs.mudynamics.com/advisories/MU-200908-01.txt
SECTRACK http://www.securitytracker.com/id?1022705
VUPEN http://www.vupen.com/english/advisories/2009/2229

Alert History

If you want to see full details history, please login or register.
2018-10-11 00:19:40
  • Multiple Updates
2016-04-26 19:01:25
  • Multiple Updates
2014-02-17 10:51:06
  • Multiple Updates
2014-01-19 21:26:06
  • Multiple Updates
2013-05-10 23:55:17
  • Multiple Updates