Vulnerability Details : CVE-2008-2119
Asterisk Open Source 1.0.x and 1.2.x before 1.2.29 and Business Edition A.x.x and B.x.x before B.2.5.3, when pedantic parsing (aka pedanticsipchecking) is enabled, allows remote attackers to cause a denial of service (daemon crash) via a SIP INVITE message that lacks a From header, related to invocations of the ast_uri_decode function, and improper handling of (1) an empty const string and (2) a NULL pointer.
Vulnerability category: Input validationDenial of service
Products affected by CVE-2008-2119
- cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:asterisk_business_edition:b2.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.2.14:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.2.0beta1:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.2.0beta2:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.0.11.1:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.2.26:*:*:*:*:*:*:*
- cpe:2.3:a:asterisk:open_source:1.2.27:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-2119
1.37%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 87 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-2119
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2008-2119
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-2119
-
http://www.securitytracker.com/id?1020166
GoDaddy Domain Name Search
-
http://bugs.digium.com/view.php?id=12607
-
https://www.exploit-db.com/exploits/5749
Asterisk 1.2.x - SIP channel driver / in pedantic mode Remote Crash - Multiple dos Exploit
-
http://security.gentoo.org/glsa/glsa-200905-01.xml
Asterisk: Multiple vulnerabilities (GLSA 200905-01) — Gentoo security
-
http://downloads.digium.com/pub/security/AST-2008-008.html
Index of /pub/security/
-
http://svn.digium.com/view/asterisk?view=rev&revision=120109
404 Not Found
-
http://www.vupen.com/english/advisories/2008/1731
Site en construction
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/42823
Asterisk ast_uri_decode() denial of service CVE-2008-2119 Vulnerability Report
-
http://www.securityfocus.com/archive/1/493020/100/0/threaded
Jump to