CVE-2008-3263
22.07.2008, 23:41
The IAX2 protocol implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (call-number exhaustion and CPU consumption) by quickly sending a large number of IAX2 (IAX) POKE requests.Enginsight
Vendor | Product | Version |
---|---|---|
asterisk | asterisk | 0.1.0 |
asterisk | asterisk | 0.1.1 |
asterisk | asterisk | 0.1.2 |
asterisk | asterisk | 0.1.3 |
asterisk | asterisk | 0.1.4 |
asterisk | asterisk | 0.1.5 |
asterisk | asterisk | 0.1.6 |
asterisk | asterisk | 0.1.7 |
asterisk | asterisk | 0.1.8 |
asterisk | asterisk | 0.1.9 |
asterisk | asterisk | 0.1.9_1:_1 |
asterisk | asterisk | 0.1.10 |
asterisk | asterisk | 0.1.11 |
asterisk | asterisk | 0.1.12 |
asterisk | asterisk | 0.2 |
asterisk | asterisk | 0.3 |
asterisk | asterisk | 0.4 |
asterisk | asterisk | 0.5.0 |
asterisk | asterisk | 0.7.0 |
asterisk | asterisk | 0.7.1 |
asterisk | asterisk | 0.7.2 |
asterisk | asterisk | 0.9.0 |
asterisk | asterisk | 1.0 |
asterisk | asterisk | 1.0:rc1 |
asterisk | asterisk | 1.0.1 |
asterisk | asterisk | 1.0.2 |
asterisk | asterisk | 1.0.3 |
asterisk | asterisk | 1.0.4 |
asterisk | asterisk | 1.0.5 |
asterisk | asterisk | 1.0.6 |
asterisk | asterisk | 1.0.7 |
asterisk | asterisk | 1.0.8 |
asterisk | asterisk | 1.0.9 |
asterisk | asterisk | 1.0.10 |
asterisk | asterisk | 1.0.11 |
asterisk | asterisk | 1.0.11.1 |
asterisk | asterisk | 1.0.12 |
asterisk | asterisk | 1.2.0_beta1:_beta1 |
asterisk | asterisk | 1.2.0_beta2:_beta2 |
asterisk | asterisk | 1.2.1 |
asterisk | asterisk | 1.2.2 |
asterisk | asterisk | 1.2.3 |
asterisk | asterisk | 1.2.4 |
asterisk | asterisk | 1.2.5 |
asterisk | asterisk | 1.2.6 |
asterisk | asterisk | 1.2.7 |
asterisk | asterisk | 1.2.7.1 |
asterisk | asterisk | 1.2.8 |
asterisk | asterisk | 1.2.9 |
asterisk | asterisk | 1.2.9.1 |
asterisk | asterisk | 1.2.10 |
asterisk | asterisk | 1.2.11 |
asterisk | asterisk | 1.2.12 |
asterisk | asterisk | 1.2.13 |
asterisk | asterisk | 1.2.14 |
asterisk | asterisk | 1.2.15 |
asterisk | asterisk | 1.2.16 |
asterisk | asterisk | 1.2.17 |
asterisk | asterisk | 1.2.18 |
asterisk | asterisk | 1.2.19 |
asterisk | asterisk | 1.2.20 |
asterisk | asterisk | 1.2.21 |
asterisk | asterisk | 1.2.22 |
asterisk | asterisk | 1.2.23 |
asterisk | asterisk | 1.2.24 |
asterisk | asterisk | 1.2.25 |
asterisk | asterisk | 1.2.26 |
asterisk | asterisk | 1.2.26.1 |
asterisk | asterisk | 1.2.26.2 |
asterisk | asterisk | 1.2.27 |
asterisk | asterisk | 1.2.28 |
asterisk | asterisk | 1.2.28.1 |
asterisk | asterisk | 1.2.29 |
asterisk | asterisk | 1.2.30 |
asterisk | asterisk | 1.4.1 |
asterisk | asterisk | 1.4.2 |
asterisk | asterisk | 1.4.3 |
asterisk | asterisk | 1.4.4 |
asterisk | asterisk | 1.4.4_2007-04-27:_2007 |
asterisk | asterisk | 1.4.5 |
asterisk | asterisk | 1.4.6 |
asterisk | asterisk | 1.4.7 |
asterisk | asterisk | 1.4.8 |
asterisk | asterisk | 1.4.9 |
asterisk | asterisk | 1.4.10 |
asterisk | asterisk | 1.4.11 |
asterisk | asterisk | 1.4.12 |
asterisk | asterisk | 1.4.13 |
asterisk | asterisk | 1.4.14 |
asterisk | asterisk | 1.4.15 |
asterisk | asterisk | 1.4.16 |
asterisk | asterisk | 1.4.16.1 |
asterisk | asterisk | 1.4.16.2 |
asterisk | asterisk | 1.4.17 |
asterisk | asterisk | 1.4.18 |
asterisk | asterisk | 1.4.18.1 |
asterisk | asterisk | 1.4.19 |
asterisk | asterisk | 1.4_beta:_beta |
asterisk | asterisk | 1.4_revision_95946:_revision_95946 |
asterisk | asterisk | 1.6 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References