2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2008-1390" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2008-03-24T17:44:00.000" ,
"lastModified" : "2018-10-11T20:33:14.360" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses."
} ,
{
"lang" : "es" ,
"value" : "El servidor AsteriskGUI HTTP en Asterisk Open Source 1.4.x antes de 1.4.19-rc3 y 1.6.x antes de 1.6.0-beta6, Business Edition C.x.x antes de C.1.6, AsteriskNOW antes de 1.0.2, Appliance Developer Kit antes de la revisi\u00f3n 104704 y s800i 1.0.x antes de 1.1.0.2 genera valores ID de gesti\u00f3n no lo suficientemente aleatorios, lo que facilita a atacantes remotos secuestrar una sesi\u00f3n de gesti\u00f3n a trav\u00e9s de una serie de adivinaciones de ID."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:C/I:C/A:C" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
"availabilityImpact" : "COMPLETE" ,
"baseScore" : 9.3
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : true ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-255"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "593AA737-5AF3-4F7C-B74B-D3F37701C435"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D942B911-979A-4AC3-93D6-07E420171E77"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisk:1.4.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "84CB8C4A-F001-4DD7-8DFE-CB082B4BB969"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisk:1.4.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "96DB0240-E93D-4BDB-859B-B44C91996993"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisk:1.4.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0F4BA849-E092-404A-92CD-44C2D99AE971"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisk:1.4.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2C7014B4-1860-49AD-9469-9954C3CC01C0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisk:1.4.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3D1F0056-0945-476C-982E-7B41EB420A99"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisk:1.4.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A53DEC9D-B288-42CD-9387-57315AC98D72"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisk:1.4.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "89C1F33F-27B6-4C56-92FF-EB2861ABBC22"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisk:1.4.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "64E07CF3-073D-4705-96A6-13367D4F5CAA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisk:1.4.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "18D19CB0-E3D7-40DB-B0C0-B62BB6075267"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisk:1.4.12:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "77FB7CC1-BD0D-4F34-AB21-59CFD23C494C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisk:1.4.13:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "997FA3C7-1894-478A-ABF1-52DD2B0487E1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisk:1.4.14:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "96E02BE0-BF4A-46C9-AFB5-47E8F18E3D17"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisk:1.4.15:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "292190EE-D9C8-4E3A-BB34-0ECD7B865482"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisk:1.4.16:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7DAC55F9-1D43-4AA8-87C9-DB165442700B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisk:1.4.17:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "195B012E-0538-4140-9035-F5D1A442778B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisk:1.4.18.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "78AC03A7-41AB-45AF-AD89-291A7429B8A0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "181C8E98-2138-4BFC-B6B0-1DA270AEE7F6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisk:1.4_revision_95946:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DB08F4FA-8600-4D21-A565-B3BF636634B4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisk:1.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FEAE6729-D79A-49B8-9758-BA74A60A238A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1C05B437-C292-4AA0-8AFE-1CA07CD80034"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0102C4C0-1A7D-4AB7-9817-44E6B0DB761E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "81DDF486-4185-48EE-869E-0AA6726C31F7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CF45A8E1-F6B1-42BD-9168-12062FA6EAEA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C5757B9B-2759-439A-9A6D-CCDD6C8C8940"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FCD71268-EAA2-477B-8AC4-DE4853A262B8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "529B2115-A191-4F3F-8F8C-A38B7C45463A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:1.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7E2D0508-C418-48CE-BF83-39F893688D1C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5BC80EBD-14D3-44A6-A06F-0549722E0EFA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7859797F-E9AD-4429-BD2C-A24EC24A5D03"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisknow:1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CC6FE17C-3B08-4675-9F73-5DC0C2438BB1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B12A09BE-1EE0-46D5-B3F0-E8847409A49A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7A5A734E-1DD3-4924-8AC1-97048FA3270F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:asterisknow:beta_7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3AE2F09E-4B5A-4EDF-A48A-BCBBAA80156B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:s800i:1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0C3A0A08-4107-4B8B-AE7E-DC23849A54DC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:s800i:1.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9320928D-D83C-4258-AF62-AB2D1F50D972"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:s800i:1.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "569084D1-977D-41FC-A444-0B3F5199DDD3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:s800i:1.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "02D182FB-761C-4F08-A776-B613FAC55230"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:asterisk:s800i:1.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A7B5EDAB-61DD-4864-A159-39292D339DA2"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://downloads.digium.com/pub/security/AST-2008-005.html" ,
"source" : "cve@mitre.org"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/29449" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/29470" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://securityreason.com/securityalert/3764" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/489819/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/28316" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securitytracker.com/id?1019679" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41304" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html" ,
"source" : "cve@mitre.org"
}
]
}