Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

CVE Kennung:CVE-2008-1897
Beschreibung:The IAX2 channel driver (chan_iax2) in Asterisk Open Source 1.0.x, 1.2.x before 1.2.28, and 1.4.x before 1.4.19.1; Business Edition A.x.x, B.x.x before B.2.5.2, and C.x.x before C.1.8.1; AsteriskNOW before 1.0.3; Appliance Developer Kit 0.x.x; and s800i before 1.1.0.3, when configured to allow unauthenticated calls, does not verify that an ACK response contains a call number matching the server's reply to a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed ACK response that does not complete a 3-way handshake. NOTE: this issue exists because of an incomplete fix for CVE-2008-1923.
Test Kennungen: 1.3.6.1.4.1.25623.1.0.60917   1.3.6.1.4.1.25623.1.0.60929   1.3.6.1.4.1.25623.1.0.60921  
Querverweise: Common Vulnerability Exposure (CVE) ID: CVE-2008-1897
BugTraq ID: 28901
http://www.securityfocus.com/bid/28901
Bugtraq: 20080422 AST-2008-006 - 3-way handshake in IAX2 incomplete (Google Search)
http://www.securityfocus.com/archive/1/491220/100/0/threaded
Debian Security Information: DSA-1563 (Google Search)
http://www.debian.org/security/2008/dsa-1563
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00581.html
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00600.html
http://security.gentoo.org/glsa/glsa-200905-01.xml
http://www.altsci.com/concepts/page.php?s=asteri&p=2
http://www.securitytracker.com/id?1019918
http://secunia.com/advisories/29927
http://secunia.com/advisories/30010
http://secunia.com/advisories/30042
http://secunia.com/advisories/34982
http://www.vupen.com/english/advisories/2008/1324
XForce ISS Database: asterisk-iax2protocol-ack-dos(41966)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41966




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.