mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
373 lines
15 KiB
JSON
373 lines
15 KiB
JSON
{
|
|
"id": "CVE-2008-2119",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2008-06-04T19:32:00.000",
|
|
"lastModified": "2018-10-11T20:39:33.717",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Asterisk Open Source 1.0.x and 1.2.x before 1.2.29 and Business Edition A.x.x and B.x.x before B.2.5.3, when pedantic parsing (aka pedanticsipchecking) is enabled, allows remote attackers to cause a denial of service (daemon crash) via a SIP INVITE message that lacks a From header, related to invocations of the ast_uri_decode function, and improper handling of (1) an empty const string and (2) a NULL pointer."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Asterisk Open Source 1.0.x y 1.2.x anterior 1.2.29 y Business Edition A.x.x y B.x.x anterior B.2.5.3, cuando \"pedantic parsing\" (tambi\u00e9n conocido como pedanticsipchecking) est\u00e1 activado, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de demonio) a trav\u00e9s de un mensaje SIP INVITE que carece de una cabecera From, relacionado con la invocaci\u00f3n de la funci\u00f3n ast_uri_decode y el manejo incorrecto de (1) una cadena const vac\u00eda y (2) un puntero NULL."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 4.3
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-20"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "b2.5.2",
|
|
"matchCriteriaId": "366DB62C-2E86-4614-AD9D-90C2F21434CB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "802F8680-AB38-41AF-BFC8-F6927F6B1626"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BCAE8D90-B032-4C60-B487-BE655D00FFAE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AB64A872-B7B8-46A8-81E4-49EDAC160531"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "21000270-C9B9-430C-A252-763887A15835"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "12F7CF45-5482-4947-8F1D-48C746987475"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7B64995D-7892-49AB-A89D-A5D15615C5D9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0397DBD4-EA00-444A-9008-4932F99DF325"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6FCD865F-BC39-4255-A797-6E5945773337"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E4956871-4DD3-4299-8BEB-9D98A4449A42"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b2.5.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8936B494-E647-498B-8380-AE4DAD458533"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.2.28",
|
|
"matchCriteriaId": "6CF7D9C2-C6B3-40E9-92B8-C504656BB176"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "678DB154-4363-42FF-8B28-367923FC6595"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E8F2C378-FF0E-4765-9F66-625C4064D5CF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A55A9295-F632-4856-90A1-38371EB98589"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7FAE6AF1-884D-41F7-B174-9E13C7719C99"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DCA9E35B-9A6B-42F2-9315-9C7D09F62227"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DDF7EC20-A424-45E5-B7E4-3CC86075858C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C790E105-55C8-4CDC-9FA8-E1FF6F130A67"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "44C860EF-2B29-4995-B942-000CC43FDD14"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1ADB80EF-C724-44BA-88FC-24087799D0C6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "78B39BE8-7E2D-42DF-8633-44CAD5662777"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F39036E3-0027-4C72-9DEB-9A6E2B4512C4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A037E6F9-3EF7-4EEB-AC16-081421BCE40D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.11.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6A7EC02A-9C9E-4589-BBB3-1908D3078A7B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.0.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6C70FA9C-6F3B-4BDF-97FB-81D06AB0EE65"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9F7971E1-F136-4ADC-95EC-BC4F92E838CF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.0beta1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7435F043-F92B-4635-93CC-A2C39AAE1BCA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.0beta2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C7B2F43B-8B69-4BF6-86B7-A225175FF068"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "27202966-2C41-4964-9497-1887D2A834C0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1471B5A2-15BE-4E7C-BA49-2E6002F7C8EC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9E79CCE5-C29B-4726-8D2F-BC20F70959BA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F29C13DB-6F04-4B41-90A2-2408D70F3641"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0F4F734E-0E78-4957-B323-8E9FBA7FF15C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1A4B117B-E945-4033-A79D-10DFAA3DF18B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EA6D866F-8189-4FFD-AA24-47C0A015C246"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.14:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A4EBFB79-C269-4132-BFAB-451F66CE8289"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E9E1028E-2C07-4BA3-B891-FA853A87B280"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9E74F577-70BD-4FAF-BCFD-10CD21FC5601"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "57BB03E2-E61C-4A94-82DF-8720698CE271"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1B30A36F-5CE6-4246-8752-176FB5999C1A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E0F76DFD-4DAC-4B02-8967-B242CDEEF6C9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6A59BC20-3217-4584-9196-D1CD9E0D6B52"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "56F728BA-FC9E-4EEE-9A08-C9C7433BD8D9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3C64DF29-5B3D-401E-885E-8E37FD577254"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1A7BF52A-2FF8-40ED-B757-28A1101DE8F5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7A321C2D-852B-4498-ADD6-79956410AB94"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9D5F0DCF-C6A2-4A09-90C9-D70F174FDEF5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C820538E-14EC-43C1-80DB-6AAE4905EF0B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.26:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E9562112-2505-4F78-86DE-F30EFAEE47D5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1A6D8FD0-C8C1-4868-9AF1-96B1949C18AE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "72A840B4-216B-4063-997F-791FBC8C8658"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.27:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BE47A547-26E7-48F9-B0A6-2F65E04A1EDE"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://bugs.digium.com/view.php?id=12607",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://downloads.digium.com/pub/security/AST-2008-008.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://security.gentoo.org/glsa/glsa-200905-01.xml",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://svn.digium.com/view/asterisk?view=rev&revision=120109",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/493020/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id?1020166",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2008/1731",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42823",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://www.exploit-db.com/exploits/5749",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |