Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2008-0095

Overview

Vulnerability Score 5.0 5.0
CVE Id CVE-2008-0095
Last Modified 07 Mar 2011 10:03:56
Published 07 Jan 2008 09:46:00
Confidentiality Impact NONE NONE
Integrity Impact NONE NONE
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2008-0095

Summary

The SIP channel driver in Asterisk Open Source 1.4.x before 1.4.17, Business Edition before C.1.0-beta8, AsteriskNOW before beta7, Appliance Developer Kit before Asterisk 1.4 revision 95946, and Appliance s800i 1.0.x before 1.0.3.4 allows remote attackers to cause a denial of service (daemon crash) via a BYE message with an Also (Also transfer) header, which triggers a NULL pointer dereference.

Vulnerable Systems

Application

  • Asterisk Appliance Developer Kit 1.4 Revision 95945

  • Asterisk Business Edition C.1.0beta7

  • Asterisk Open Source 1.4.16

  • Asterisk S800i 1.0.3.3

  • Asterisknow Beta 6


References

BID - 27110

SECUNIA - 28312

CONFIRM - http://downloads.digium.com/pub/security/AST-2008-001.html

MISC - http://bugs.digium.com/view.php?id=11637

FEDORA - FEDORA-2008-0199

FEDORA - FEDORA-2008-0198

XF - asterisk-bye-also-dos(39361)

VUPEN - ADV-2008-0019

SECTRACK - 1019152

BUGTRAQ - 20080102 AST-2008-001: Crash from transfer using BYE with Also header

SECUNIA - 28299

SREASON - 3520


Last Updated: 27 May 2016 10:46:40