302 lines
12 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2008-1390",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-03-24T17:44:00.000",
"lastModified": "2018-10-11T20:33:14.360",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses."
},
{
"lang": "es",
"value": "El servidor AsteriskGUI HTTP en Asterisk Open Source 1.4.x antes de 1.4.19-rc3 y 1.6.x antes de 1.6.0-beta6, Business Edition C.x.x antes de C.1.6, AsteriskNOW antes de 1.0.2, Appliance Developer Kit antes de la revisi\u00f3n 104704 y s800i 1.0.x antes de 1.1.0.2 genera valores ID de gesti\u00f3n no lo suficientemente aleatorios, lo que facilita a atacantes remotos secuestrar una sesi\u00f3n de gesti\u00f3n a trav\u00e9s de una serie de adivinaciones de ID."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-255"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "593AA737-5AF3-4F7C-B74B-D3F37701C435"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D942B911-979A-4AC3-93D6-07E420171E77"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "84CB8C4A-F001-4DD7-8DFE-CB082B4BB969"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "96DB0240-E93D-4BDB-859B-B44C91996993"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0F4BA849-E092-404A-92CD-44C2D99AE971"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "2C7014B4-1860-49AD-9469-9954C3CC01C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3D1F0056-0945-476C-982E-7B41EB420A99"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A53DEC9D-B288-42CD-9387-57315AC98D72"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "89C1F33F-27B6-4C56-92FF-EB2861ABBC22"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "64E07CF3-073D-4705-96A6-13367D4F5CAA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "18D19CB0-E3D7-40DB-B0C0-B62BB6075267"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "77FB7CC1-BD0D-4F34-AB21-59CFD23C494C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "997FA3C7-1894-478A-ABF1-52DD2B0487E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.14:*:*:*:*:*:*:*",
"matchCriteriaId": "96E02BE0-BF4A-46C9-AFB5-47E8F18E3D17"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.15:*:*:*:*:*:*:*",
"matchCriteriaId": "292190EE-D9C8-4E3A-BB34-0ECD7B865482"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.16:*:*:*:*:*:*:*",
"matchCriteriaId": "7DAC55F9-1D43-4AA8-87C9-DB165442700B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.17:*:*:*:*:*:*:*",
"matchCriteriaId": "195B012E-0538-4140-9035-F5D1A442778B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "78AC03A7-41AB-45AF-AD89-291A7429B8A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*",
"matchCriteriaId": "181C8E98-2138-4BFC-B6B0-1DA270AEE7F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisk:1.4_revision_95946:*:*:*:*:*:*:*",
"matchCriteriaId": "DB08F4FA-8600-4D21-A565-B3BF636634B4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisk:1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FEAE6729-D79A-49B8-9758-BA74A60A238A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1C05B437-C292-4AA0-8AFE-1CA07CD80034"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0102C4C0-1A7D-4AB7-9817-44E6B0DB761E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "81DDF486-4185-48EE-869E-0AA6726C31F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "CF45A8E1-F6B1-42BD-9168-12062FA6EAEA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C5757B9B-2759-439A-9A6D-CCDD6C8C8940"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FCD71268-EAA2-477B-8AC4-DE4853A262B8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "529B2115-A191-4F3F-8F8C-A38B7C45463A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7E2D0508-C418-48CE-BF83-39F893688D1C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta7:*:*:*:*:*:*:*",
"matchCriteriaId": "5BC80EBD-14D3-44A6-A06F-0549722E0EFA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta8:*:*:*:*:*:*:*",
"matchCriteriaId": "7859797F-E9AD-4429-BD2C-A24EC24A5D03"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisknow:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CC6FE17C-3B08-4675-9F73-5DC0C2438BB1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:*",
"matchCriteriaId": "B12A09BE-1EE0-46D5-B3F0-E8847409A49A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:*",
"matchCriteriaId": "7A5A734E-1DD3-4924-8AC1-97048FA3270F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:asterisknow:beta_7:*:*:*:*:*:*:*",
"matchCriteriaId": "3AE2F09E-4B5A-4EDF-A48A-BCBBAA80156B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:s800i:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0C3A0A08-4107-4B8B-AE7E-DC23849A54DC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:s800i:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9320928D-D83C-4258-AF62-AB2D1F50D972"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:s800i:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "569084D1-977D-41FC-A444-0B3F5199DDD3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:s800i:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "02D182FB-761C-4F08-A776-B613FAC55230"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:s800i:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A7B5EDAB-61DD-4864-A159-39292D339DA2"
}
]
}
]
}
],
"references": [
{
"url": "http://downloads.digium.com/pub/security/AST-2008-005.html",
"source": "cve@mitre.org"
},
{
"url": "http://securityreason.com/securityalert/3764",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/489819/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/28316",
"source": "cve@mitre.org"
},
{
"url": "http://www.securitytracker.com/id?1019679",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41304",
"source": "cve@mitre.org"
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html",
"source": "cve@mitre.org"
}
]
}