Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2008-1289

Overview

Vulnerability Score 7.5 7.5
CVE Id CVE-2008-1289
Last Modified 07 Mar 2011 10:06:28
Published 24 Mar 2008 01:44:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2008-1289

Summary

Multiple buffer overflows in Asterisk Open Source 1.4.x before 1.4.18.1 and 1.4.19-rc3, Open Source 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6.1, AsteriskNOW 1.0.x before 1.0.2, Appliance Developer Kit before 1.4 revision 109386, and s800i 1.1.x before 1.1.0.2 allow remote attackers to (1) write a zero to an arbitrary memory location via a large RTP payload number, related to the ast_rtp_unset_m_type function in main/rtp.c; or (2) write certain integers to an arbitrary memory location via a large number of RTP payloads, related to the process_sdp function in channels/chan_sip.c.

Vulnerable Systems

Application

  • Asterisk Appliance Developer Kit 1.4

  • Asterisk Business Edition C.1.0-beta8

  • Asterisk Business Edition C.1.0beta7

  • Asterisk Open Source 1.4.18

  • Asterisk Open Source 1.4.19

  • Asterisk Open Source 1.6.0 Beta5

  • Asterisk S800i 1.1.0.1

  • Asterisknow 1.0.1


References

XF - asterisk-rtp-codecpayload-bo(41305)

XF - asterisk-rtppayload-bo(41302)

VUPEN - ADV-2008-0928

BID - 28308

BUGTRAQ - 20080318 AST-2008-002: Two buffer overflows in RTP Codec Payload Handling

CONFIRM - http://www.asterisk.org/node/48466

SECTRACK - 1019628

SECUNIA - 29426

MISC - http://labs.musecurity.com/advisories/MU-200803-01.txt

CONFIRM - http://downloads.digium.com/pub/security/AST-2008-002.html

FEDORA - FEDORA-2008-2620

FEDORA - FEDORA-2008-2554

SREASON - 3763

SECUNIA - 29470


Last Updated: 27 May 2016 10:47:06