Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2008-3263

Overview

Vulnerability Score 7.8 7.8
CVE Id CVE-2008-3263
Last Modified 07 Mar 2011 10:10:30
Published 22 Jul 2008 07:41:00
Confidentiality Impact NONE NONE
Integrity Impact NONE NONE
Availability Impact COMPLETE COMPLETE
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2008-3263

Summary

The IAX2 protocol implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (call-number exhaustion and CPU consumption) by quickly sending a large number of IAX2 (IAX) POKE requests.

Vulnerable Systems

Application

  • Asterisk 0.1.0

  • Asterisk 0.1.1

  • Asterisk 0.1.10

  • Asterisk 0.1.11

  • Asterisk 0.1.12

  • Asterisk 0.1.2

  • Asterisk 0.1.3

  • Asterisk 0.1.4

  • Asterisk 0.1.5

  • Asterisk 0.1.6

  • Asterisk 0.1.7

  • Asterisk 0.1.8

  • Asterisk 0.1.9

  • Asterisk 0.1.9 1

  • Asterisk 0.2

  • Asterisk 0.3

  • Asterisk 0.4

  • Asterisk 0.5.0

  • Asterisk 0.7.0

  • Asterisk 0.7.1

  • Asterisk 0.7.2

  • Asterisk 0.9.0

  • Asterisk 1.0

  • Asterisk 1.0.1

  • Asterisk 1.0.10

  • Asterisk 1.0.11

  • Asterisk 1.0.11.1

  • Asterisk 1.0.12

  • Asterisk 1.0.2

  • Asterisk 1.0.3

  • Asterisk 1.0.4

  • Asterisk 1.0.5

  • Asterisk 1.0.6

  • Asterisk 1.0.7

  • Asterisk 1.0.8

  • Asterisk 1.0.9

  • Asterisk 1.2.0 Beta1

  • Asterisk 1.2.0 Beta2

  • Asterisk 1.2.1

  • Asterisk 1.2.10

  • Asterisk 1.2.11

  • Asterisk 1.2.12

  • Asterisk 1.2.13

  • Asterisk 1.2.14

  • Asterisk 1.2.15

  • Asterisk 1.2.16

  • Asterisk 1.2.17

  • Asterisk 1.2.18

  • Asterisk 1.2.19

  • Asterisk 1.2.2

  • Asterisk 1.2.20

  • Asterisk 1.2.21

  • Asterisk 1.2.22

  • Asterisk 1.2.23

  • Asterisk 1.2.24

  • Asterisk 1.2.25

  • Asterisk 1.2.26

  • Asterisk 1.2.26.1

  • Asterisk 1.2.26.2

  • Asterisk 1.2.27

  • Asterisk 1.2.28

  • Asterisk 1.2.28.1

  • Asterisk 1.2.29

  • Asterisk 1.2.3

  • Asterisk 1.2.30

  • Asterisk 1.2.4

  • Asterisk 1.2.5

  • Asterisk 1.2.6

  • Asterisk 1.2.7

  • Asterisk 1.2.7.1

  • Asterisk 1.2.8

  • Asterisk 1.2.9

  • Asterisk 1.2.9.1

  • Asterisk 1.4 Beta

  • Asterisk 1.4 Revision 95946

  • Asterisk 1.4.1

  • Asterisk 1.4.10

  • Asterisk 1.4.11

  • Asterisk 1.4.12

  • Asterisk 1.4.13

  • Asterisk 1.4.14

  • Asterisk 1.4.15

  • Asterisk 1.4.16

  • Asterisk 1.4.16.1

  • Asterisk 1.4.16.2

  • Asterisk 1.4.17

  • Asterisk 1.4.18

  • Asterisk 1.4.18.1

  • Asterisk 1.4.19

  • Asterisk 1.4.2

  • Asterisk 1.4.3

  • Asterisk 1.4.4

  • Asterisk 1.4.4 2007-04-27

  • Asterisk 1.4.5

  • Asterisk 1.4.6

  • Asterisk 1.4.7

  • Asterisk 1.4.8

  • Asterisk 1.4.9

  • Asterisk 1.6

  • Asterisk A

  • Asterisk B.1.3.2

  • Asterisk B.1.3.3

  • Asterisk B.2.2.0


References

FEDORA - FEDORA-2008-6676

XF - asterisk-poke-dos(43942)

VUPEN - ADV-2008-2168

SECTRACK - 1020535

BID - 30321

BUGTRAQ - 20080722 AST-2008-010: Asterisk IAX 'POKE' resource exhaustion

GENTOO - GLSA-200905-01

SECUNIA - 34982

SECUNIA - 31194

SECUNIA - 31178

MISC - http://downloads.securityfocus.com/vulnerabilities/exploits/30321.pl

CONFIRM - http://downloads.digium.com/pub/security/AST-2008-010.html


Last Updated: 27 May 2016 10:48:08