mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 17:51:17 +00:00
302 lines
12 KiB
JSON
302 lines
12 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2008-1390",
|
||
|
"sourceIdentifier": "cve@mitre.org",
|
||
|
"published": "2008-03-24T17:44:00.000",
|
||
|
"lastModified": "2018-10-11T20:33:14.360",
|
||
|
"vulnStatus": "Modified",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "El servidor AsteriskGUI HTTP en Asterisk Open Source 1.4.x antes de 1.4.19-rc3 y 1.6.x antes de 1.6.0-beta6, Business Edition C.x.x antes de C.1.6, AsteriskNOW antes de 1.0.2, Appliance Developer Kit antes de la revisi\u00f3n 104704 y s800i 1.0.x antes de 1.1.0.2 genera valores ID de gesti\u00f3n no lo suficientemente aleatorios, lo que facilita a atacantes remotos secuestrar una sesi\u00f3n de gesti\u00f3n a trav\u00e9s de una serie de adivinaciones de ID."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
|
"accessVector": "NETWORK",
|
||
|
"accessComplexity": "MEDIUM",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "COMPLETE",
|
||
|
"integrityImpact": "COMPLETE",
|
||
|
"availabilityImpact": "COMPLETE",
|
||
|
"baseScore": 9.3
|
||
|
},
|
||
|
"baseSeverity": "HIGH",
|
||
|
"exploitabilityScore": 8.6,
|
||
|
"impactScore": 10.0,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": true,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": false
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-255"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "593AA737-5AF3-4F7C-B74B-D3F37701C435"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "D942B911-979A-4AC3-93D6-07E420171E77"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.3:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "84CB8C4A-F001-4DD7-8DFE-CB082B4BB969"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.4:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "96DB0240-E93D-4BDB-859B-B44C91996993"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.5:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "0F4BA849-E092-404A-92CD-44C2D99AE971"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.6:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "2C7014B4-1860-49AD-9469-9954C3CC01C0"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.7:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "3D1F0056-0945-476C-982E-7B41EB420A99"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.8:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "A53DEC9D-B288-42CD-9387-57315AC98D72"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.9:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "89C1F33F-27B6-4C56-92FF-EB2861ABBC22"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.10:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "64E07CF3-073D-4705-96A6-13367D4F5CAA"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.11:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "18D19CB0-E3D7-40DB-B0C0-B62BB6075267"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.12:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "77FB7CC1-BD0D-4F34-AB21-59CFD23C494C"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.13:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "997FA3C7-1894-478A-ABF1-52DD2B0487E1"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.14:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "96E02BE0-BF4A-46C9-AFB5-47E8F18E3D17"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.15:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "292190EE-D9C8-4E3A-BB34-0ECD7B865482"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.16:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "7DAC55F9-1D43-4AA8-87C9-DB165442700B"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.17:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "195B012E-0538-4140-9035-F5D1A442778B"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.18.1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "78AC03A7-41AB-45AF-AD89-291A7429B8A0"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "181C8E98-2138-4BFC-B6B0-1DA270AEE7F6"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4_revision_95946:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "DB08F4FA-8600-4D21-A565-B3BF636634B4"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisk:1.6:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "FEAE6729-D79A-49B8-9758-BA74A60A238A"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.2:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "1C05B437-C292-4AA0-8AFE-1CA07CD80034"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.3:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "0102C4C0-1A7D-4AB7-9817-44E6B0DB761E"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.4:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "81DDF486-4185-48EE-869E-0AA6726C31F7"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.5:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "CF45A8E1-F6B1-42BD-9168-12062FA6EAEA"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "C5757B9B-2759-439A-9A6D-CCDD6C8C8940"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.7:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "FCD71268-EAA2-477B-8AC4-DE4853A262B8"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.8:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "529B2115-A191-4F3F-8F8C-A38B7C45463A"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:1.4:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "7E2D0508-C418-48CE-BF83-39F893688D1C"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta7:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "5BC80EBD-14D3-44A6-A06F-0549722E0EFA"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta8:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "7859797F-E9AD-4429-BD2C-A24EC24A5D03"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisknow:1.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "CC6FE17C-3B08-4675-9F73-5DC0C2438BB1"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "B12A09BE-1EE0-46D5-B3F0-E8847409A49A"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "7A5A734E-1DD3-4924-8AC1-97048FA3270F"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:asterisknow:beta_7:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "3AE2F09E-4B5A-4EDF-A48A-BCBBAA80156B"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:s800i:1.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "0C3A0A08-4107-4B8B-AE7E-DC23849A54DC"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:s800i:1.0.1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "9320928D-D83C-4258-AF62-AB2D1F50D972"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:s800i:1.0.2:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "569084D1-977D-41FC-A444-0B3F5199DDD3"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:s800i:1.0.3:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "02D182FB-761C-4F08-A776-B613FAC55230"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:asterisk:s800i:1.1.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "A7B5EDAB-61DD-4864-A159-39292D339DA2"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "http://downloads.digium.com/pub/security/AST-2008-005.html",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://securityreason.com/securityalert/3764",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securityfocus.com/archive/1/489819/100/0/threaded",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securityfocus.com/bid/28316",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securitytracker.com/id?1019679",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41304",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html",
|
||
|
"source": "cve@mitre.org"
|
||
|
}
|
||
|
]
|
||
|
}
|