Asterisk : Security Vulnerabilities, CVEs, Published In June 2008 (Denial of service)
The ooh323 channel driver in Asterisk Addons 1.2.x before 1.2.9 and Asterisk-Addons 1.4.x before 1.4.7 creates a remotely accessible TCP port that is intended solely for localhost communication, and interprets some TCP application-data fields as addresses of memory to free, which allows remote attackers to cause a denial of service (daemon crash) via crafted TCP packets.
Max CVSS
5.0
EPSS Score
7.26%
Published
2008-06-05
Updated
2018-10-15
Asterisk Open Source 1.0.x and 1.2.x before 1.2.29 and Business Edition A.x.x and B.x.x before B.2.5.3, when pedantic parsing (aka pedanticsipchecking) is enabled, allows remote attackers to cause a denial of service (daemon crash) via a SIP INVITE message that lacks a From header, related to invocations of the ast_uri_decode function, and improper handling of (1) an empty const string and (2) a NULL pointer.
Max CVSS
4.3
EPSS Score
1.33%
Published
2008-06-04
Updated
2018-10-11
2 vulnerabilities found