CVE-2008-2119

Asterisk Open Source 1.0.x and 1.2.x before 1.2.29 and Business Edition A.x.x and B.x.x before B.2.5.3, when pedantic parsing (aka pedanticsipchecking) is enabled, allows remote attackers to cause a denial of service (daemon crash) via a SIP INVITE message that lacks a From header, related to invocations of the ast_uri_decode function, and improper handling of (1) an empty const string and (2) a NULL pointer.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:b2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.11:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.11.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.12:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.0beta1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.0beta2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.14:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.26:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.27:*:*:*:*:*:*:*

History

21 Nov 2024, 00:46

Type Values Removed Values Added
References () http://bugs.digium.com/view.php?id=12607 - () http://bugs.digium.com/view.php?id=12607 -
References () http://downloads.digium.com/pub/security/AST-2008-008.html - () http://downloads.digium.com/pub/security/AST-2008-008.html -
References () http://secunia.com/advisories/30517 - () http://secunia.com/advisories/30517 -
References () http://secunia.com/advisories/34982 - () http://secunia.com/advisories/34982 -
References () http://security.gentoo.org/glsa/glsa-200905-01.xml - () http://security.gentoo.org/glsa/glsa-200905-01.xml -
References () http://svn.digium.com/view/asterisk?view=rev&revision=120109 - () http://svn.digium.com/view/asterisk?view=rev&revision=120109 -
References () http://www.securityfocus.com/archive/1/493020/100/0/threaded - () http://www.securityfocus.com/archive/1/493020/100/0/threaded -
References () http://www.securitytracker.com/id?1020166 - () http://www.securitytracker.com/id?1020166 -
References () http://www.vupen.com/english/advisories/2008/1731 - () http://www.vupen.com/english/advisories/2008/1731 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/42823 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/42823 -
References () https://www.exploit-db.com/exploits/5749 - () https://www.exploit-db.com/exploits/5749 -

Information

Published : 2008-06-04 19:32

Updated : 2024-11-21 00:46


NVD link : CVE-2008-2119

Mitre link : CVE-2008-2119

CVE.ORG link : CVE-2008-2119


JSON object : View

Products Affected

asterisk

  • open_source
  • asterisk_business_edition
CWE
CWE-20

Improper Input Validation