CVE-2008-1923
23.04.2008, 16:05
The IAX2 channel driver (chan_iax2) in Asterisk 1.2 before revision 72630 and 1.4 before revision 65679, when configured to allow unauthenticated calls, sends "early audio" to an unverified source IP address of a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed NEW message.Enginsight
Vendor | Product | Version |
---|---|---|
asterisk | asterisk_appliance_developer_kit | * |
asterisk | asterisknow | 𝑥 ≤ 1.0.2 |
asterisk | asterisknow | 1.0 |
asterisk | asterisknow | 1.0.1 |
asterisk | open_source | 1.0 |
asterisk | open_source | 1.0.0 |
asterisk | open_source | 1.0.1 |
asterisk | open_source | 1.0.2 |
asterisk | open_source | 1.0.3 |
asterisk | open_source | 1.0.4 |
asterisk | open_source | 1.0.5 |
asterisk | open_source | 1.0.6 |
asterisk | open_source | 1.0.7 |
asterisk | open_source | 1.0.8 |
asterisk | open_source | 1.0.9 |
asterisk | open_source | 1.0.11 |
asterisk | open_source | 1.0.11.1 |
asterisk | open_source | 1.0.12 |
asterisk | open_source | 1.2.0 |
asterisk | open_source | 1.2.1 |
asterisk | open_source | 1.2.2 |
asterisk | open_source | 1.2.3 |
asterisk | open_source | 1.2.3:netsec |
asterisk | open_source | 1.2.4 |
asterisk | open_source | 1.2.4:netsec |
asterisk | open_source | 1.2.5 |
asterisk | open_source | 1.2.5:netsec |
asterisk | open_source | 1.2.6 |
asterisk | open_source | 1.2.6:netsec |
asterisk | open_source | 1.2.7 |
asterisk | open_source | 1.2.7:netsec |
asterisk | open_source | 1.2.7.1 |
asterisk | open_source | 1.2.7.1:netsec |
asterisk | open_source | 1.2.8 |
asterisk | open_source | 1.2.8:netsec |
asterisk | open_source | 1.2.9 |
asterisk | open_source | 1.2.9.1 |
asterisk | open_source | 1.2.9.1:netsec |
asterisk | open_source | 1.2.10 |
asterisk | open_source | 1.2.10:netsec |
asterisk | open_source | 1.2.11 |
asterisk | open_source | 1.2.11:netsec |
asterisk | open_source | 1.2.12 |
asterisk | open_source | 1.2.12:netsec |
asterisk | open_source | 1.2.12.1 |
asterisk | open_source | 1.2.13 |
asterisk | open_source | 1.2.13:netsec |
asterisk | open_source | 1.2.14 |
asterisk | open_source | 1.2.14:netsec |
asterisk | open_source | 1.2.15 |
asterisk | open_source | 1.2.15:netsec |
asterisk | open_source | 1.2.16 |
asterisk | open_source | 1.2.16:netsec |
asterisk | open_source | 1.2.17 |
asterisk | open_source | 1.2.17:netsec |
asterisk | open_source | 1.2.18 |
asterisk | open_source | 1.2.18:netsec |
asterisk | open_source | 1.2.19 |
asterisk | open_source | 1.2.19:netsec |
asterisk | open_source | 1.2.20 |
asterisk | open_source | 1.2.20:netsec |
asterisk | open_source | 1.2.21 |
asterisk | open_source | 1.2.21:netsec |
asterisk | open_source | 1.2.21.1 |
asterisk | open_source | 1.2.21.1:netsec |
asterisk | open_source | 1.2.22 |
asterisk | open_source | 1.2.22:netsec |
asterisk | open_source | 1.2.23 |
asterisk | open_source | 1.2.23:netsec |
asterisk | open_source | 1.2.24 |
asterisk | open_source | 1.2.24:netsec |
asterisk | open_source | 1.2.25 |
asterisk | open_source | 1.2.25:netsec |
asterisk | open_source | 1.2.26 |
asterisk | open_source | 1.2.26:netsec |
asterisk | open_source | 1.2.26.1 |
asterisk | open_source | 1.2.26.1:netsec |
asterisk | open_source | 1.2.26.2 |
asterisk | open_source | 1.2.26.2:netsec |
asterisk | open_source | 1.2.27 |
asterisk | open_source | 1.2.28 |
asterisk | open_source | 1.4.0 |
asterisk | open_source | 1.4.0:beta2 |
asterisk | open_source | 1.4.0:beta3 |
asterisk | open_source | 1.4.0:beta4 |
asterisk | open_source | 1.4.1 |
asterisk | open_source | 1.4.2 |
asterisk | open_source | 1.4.3 |
asterisk | open_source | 1.4.4 |
asterisk | open_source | 1.4.5 |
asterisk | open_source | 1.4.6 |
asterisk | open_source | 1.4.7 |
asterisk | open_source | 1.4.7.1 |
asterisk | open_source | 1.4.8 |
asterisk | open_source | 1.4.9 |
asterisk | open_source | 1.4.10 |
asterisk | open_source | 1.4.10.1 |
asterisk | open_source | 1.4.11 |
asterisk | open_source | 1.4.12 |
asterisk | open_source | 1.4.12.1 |
asterisk | open_source | 1.4.13 |
asterisk | open_source | 1.4.14 |
asterisk | open_source | 1.4.15 |
asterisk | open_source | 1.4.16 |
asterisk | open_source | 1.4.16.1 |
asterisk | open_source | 1.4.16.2 |
asterisk | open_source | 1.4.17 |
asterisk | open_source | 1.4.18 |
asterisk | open_source | 1.4.18.1 |
asterisk | open_source | 1.4.19:rc1 |
asterisk | open_source | 1.4.19:rc2 |
asterisk | open_source | 1.4.19:rc3 |
asterisk | open_source | 1.4.19:rc4 |
asterisk | s800i | 𝑥 ≤ 1.1.0.2 |
asterisk | s800i | 1.0 |
asterisk | s800i | 1.0.1 |
asterisk | s800i | 1.0.2 |
asterisk | s800i | 1.0.3 |
asterisk | s800i | 1.0.3.3 |
asterisk | s800i | 1.1.0 |
asterisk | s800i | 1.1.0.1 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References