Search for vulnerabilities
Vulnerability ID | VCID-mbsd-fze5-aaab |
Aliases |
CVE-2008-3263
|
Summary | The IAX2 protocol implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (call-number exhaustion and CPU consumption) by quickly sending a large number of IAX2 (IAX) POKE requests. |
Status | Published |
Exploitability | 2.0 |
Weighted Severity | 7.0 |
Risk | 10.0 |
Affected and Fixed Packages | Package Details |
CWE-399 | Resource Management Errors |
Data source | Exploit-DB |
---|---|
Date added | July 21, 2008 |
Description | Asterisk 1.6 IAX - 'POKE' Requests Remote Denial of Service |
Ransomware campaign use | Known |
Source publication date | July 21, 2008 |
Exploit type | dos |
Platform | linux |
Source update date | March 7, 2014 |
Source URL | https://www.securityfocus.com/bid/30321/info |
Exploitability (E) | Access Vector (AV) | Access Complexity (AC) | Authentication (Au) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|
high functional unproven proof_of_concept not_defined |
local adjacent_network network |
high medium low |
multiple single none |
none partial complete |
none partial complete |
none partial complete |
Percentile | 0.97609 |
EPSS Score | 0.50252 |
Published At | April 6, 2025, 12:55 p.m. |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
There are no relevant records. |