Search for vulnerabilities
Vulnerability ID | VCID-5x78-uush-aaad |
Aliases |
CVE-2008-2119
|
Summary | Asterisk Open Source 1.0.x and 1.2.x before 1.2.29 and Business Edition A.x.x and B.x.x before B.2.5.3, when pedantic parsing (aka pedanticsipchecking) is enabled, allows remote attackers to cause a denial of service (daemon crash) via a SIP INVITE message that lacks a From header, related to invocations of the ast_uri_decode function, and improper handling of (1) an empty const string and (2) a NULL pointer. |
Status | Published |
Exploitability | 2.0 |
Weighted Severity | 3.9 |
Risk | 7.8 |
Affected and Fixed Packages | Package Details |
CWE-20 | Improper Input Validation |
Data source | Exploit-DB |
---|---|
Date added | June 4, 2008 |
Description | Asterisk 1.2.x - SIP channel driver / in pedantic mode Remote Crash |
Ransomware campaign use | Known |
Source publication date | June 5, 2008 |
Exploit type | dos |
Platform | multiple |
Source update date | Dec. 5, 2016 |
Exploitability (E) | Access Vector (AV) | Access Complexity (AC) | Authentication (Au) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|
high functional unproven proof_of_concept not_defined |
local adjacent_network network |
high medium low |
multiple single none |
none partial complete |
none partial complete |
none partial complete |
Percentile | 0.86443 |
EPSS Score | 0.01331 |
Published At | Nov. 1, 2024, midnight |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
There are no relevant records. |