ID

VAR-200909-0357


CVE

CVE-2009-2346


TITLE

Asterisk Open Source of IAX2 Service disruption in protocol implementation (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2009-003591

DESCRIPTION

The IAX2 protocol implementation in Asterisk Open Source 1.2.x before 1.2.35, 1.4.x before 1.4.26.2, 1.6.0.x before 1.6.0.15, and 1.6.1.x before 1.6.1.6; Business Edition B.x.x before B.2.5.10, C.2.x before C.2.4.3, and C.3.x before C.3.1.1; and s800i 1.3.x before 1.3.0.3 allows remote attackers to cause a denial of service (call-number exhaustion) by initiating many IAX2 message exchanges, a related issue to CVE-2008-3263. The problem is CVE-2008-3263 Related toBy a third party IAX2 Service operation disruption by starting message exchange ( Call number exhaustion ) There is a possibility of being put into a state. Asterisk is prone to a remote denial-of-service vulnerability because it fails to properly handle an excessive amount of call numbers. Successful exploits can cause the application to stop accepting connections, resulting in denial-of-service conditions for legitimate users. The vulnerabilities are caused due to NULL-pointer dereference errors in the "sip_uri_params_cmp()" and "sip_uri_headers_cmp()" functions. This can be exploited to crash the application via a SIP message lacking certain headers. Successful exploitation requires that the SIP channel driver is configured with the "pedantic" option enabled. PROVIDED AND/OR DISCOVERED BY: The vendor credits bugs.digium.com user klaus3000. Asterisk Project Security Advisory - AST-2009-006 +------------------------------------------------------------------------+ | Product | Asterisk | |--------------------+---------------------------------------------------| | Summary | IAX2 Call Number Resource Exhaustion | |--------------------+---------------------------------------------------| | Nature of Advisory | Denial of Service | |--------------------+---------------------------------------------------| | Susceptibility | Remote unauthenticated sessions | |--------------------+---------------------------------------------------| | Severity | Major | |--------------------+---------------------------------------------------| | Exploits Known | Yes - Published by Blake Cornell < blake AT | | | remoteorigin DOT com > on voip0day.com | |--------------------+---------------------------------------------------| | Reported On | June 22, 2008 | |--------------------+---------------------------------------------------| | Reported By | Noam Rathaus < noamr AT beyondsecurity DOT com >, | | | with his SSD program, also by Blake Cornell | |--------------------+---------------------------------------------------| | Posted On | September 3, 2009 | |--------------------+---------------------------------------------------| | Last Updated On | September 3, 2009 | |--------------------+---------------------------------------------------| | Advisory Contact | Russell Bryant < russell AT digium DOT com > | |--------------------+---------------------------------------------------| | CVE Name | CVE-2009-2346 | +------------------------------------------------------------------------+ +------------------------------------------------------------------------+ | Description | The IAX2 protocol uses a call number to associate | | | messages with the call that they belong to. However, the | | | protocol defines the call number field in messages as a | | | fixed size 15 bit field. So, if all call numbers are in | | | use, no additional sessions can be handled. | | | | | | A call number gets created at the start of an IAX2 | | | message exchange. So, an attacker can send a large | | | number of messages and consume the call number space. | | | The attack is also possible using spoofed source IP | | | addresses as no handshake is required before a call | | | number is assigned. | +------------------------------------------------------------------------+ +------------------------------------------------------------------------+ | Resolution | Upgrade to a version of Asterisk listed in this document | | | as containing the IAX2 protocol security enhancements. In | | | addition to upgrading, administrators should consult the | | | users guide section of the IAX2 Security document | | | (IAX2-security.pdf), as well as the sample configuration | | | file for chan_iax2 that have been distributed with those | | | releases for assistance with new options that have been | | | provided. | +------------------------------------------------------------------------+ +------------------------------------------------------------------------+ | Discussion | A lot of time was spent trying to come up with a way to | | | resolve this issue in a way that was completely backwards | | | compatible. However, the final resolution ended up | | | requiring a modification to the IAX2 protocol. This | | | modification is referred to as call token validation. | | | Call token validation is used as a handshake before call | | | numbers are assigned to IAX2 connections. | | | | | | Call token validation by itself does not resolve the | | | issue. However, it does allow an IAX2 server to validate | | | that the source of the messages has not been spoofed. In | | | addition to call token validation, Asterisk now also has | | | the ability to limit the amount of call numbers assigned | | | to a given remote IP address. | | | | | | The combination of call token validation and call number | | | allocation limits is used to mitigate this denial of | | | service issue. | | | | | | An alternative approach to securing IAX2 would be to use | | | a security layer on top of IAX2, such as DTLS [RFC4347] | | | or IPsec [RFC4301]. All Rights Reserved. Permission is hereby granted to distribute and publish this advisory in its original, unaltered form. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201006-20 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Asterisk: Multiple vulnerabilities Date: June 04, 2010 Bugs: #281107, #283624, #284892, #295270 ID: 201006-20 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities in Asterisk might allow remote attackers to cause a Denial of Service condition, or conduct other attacks. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-misc/asterisk < 1.2.37 >= 1.2.37 Description =========== Multiple vulnerabilities have been reported in Asterisk: * Nick Baggott reported that Asterisk does not properly process overly long ASCII strings in various packets (CVE-2009-2726). * Noam Rathaus and Blake Cornell reported a flaw in the IAX2 protocol implementation (CVE-2009-2346). * amorsen reported an input processing error in the RTP protocol implementation (CVE-2009-4055). * Patrik Karlsson reported an information disclosure flaw related to the REGISTER message (CVE-2009-3727). * A vulnerability was found in the bundled Prototype JavaScript library, related to AJAX calls (CVE-2008-7220). Impact ====== A remote attacker could exploit these vulnerabilities by sending a specially crafted package, possibly causing a Denial of Service condition, or resulting in information disclosure. Workaround ========== There is no known workaround at this time. Resolution ========== All Asterisk users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/asterisk-1.2.37" NOTE: This is a legacy GLSA. Updates for all affected architectures are available since January 5, 2010. It is likely that your system is already no longer affected by this issue. References ========== [ 1 ] CVE-2009-2726 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2726 [ 2 ] CVE-2009-2346 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2346 [ 3 ] CVE-2009-4055 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4055 [ 4 ] CVE-2009-3727 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3727 [ 5 ] CVE-2008-7220 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7220 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201006-20.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . ---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Asterisk IAX2 Call Number Exhaustion Denial of Service SECUNIA ADVISORY ID: SA36593 VERIFY ADVISORY: http://secunia.com/advisories/36593/ DESCRIPTION: A vulnerability has been reported in Asterisk, which can be exploited by malicious people to cause a DoS (Denial of Service). S800i (Asterisk Appliance): Update to version 1.3.0.3. PROVIDED AND/OR DISCOVERED BY: The vendor credits: * Noam Rathaus * Blake Cornell ORIGINAL ADVISORY: http://downloads.asterisk.org/pub/security/AST-2009-006.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . The vulnerabilities are caused due to "sscanf()" being invoked without specifying a maximum width e.g. when processing SIP messages. This can be exploited to exhaust stack memory in the SIP stack network thread via overly long numeric strings in various fields of a message. NOTE: According to the vendor this is only potentially exploitable in 1.6.1 and above

Trust: 2.52

sources: NVD: CVE-2009-2346 // JVNDB: JVNDB-2009-003591 // BID: 36275 // VULMON: CVE-2009-2346 // PACKETSTORM: 75661 // PACKETSTORM: 80978 // PACKETSTORM: 81677 // PACKETSTORM: 90288 // PACKETSTORM: 81003 // PACKETSTORM: 80408

AFFECTED PRODUCTS

vendor:asteriskmodel:open sourcescope:eqversion:1.2.34

Trust: 1.6

vendor:asteriskmodel:opensourcescope:eqversion:1.4.24.1

Trust: 1.6

vendor:asteriskmodel:opensourcescope:eqversion:1.4.26

Trust: 1.6

vendor:asteriskmodel:opensourcescope:eqversion:1.4.24

Trust: 1.6

vendor:asteriskmodel:appliance s800iscope:eqversion:1.3.0.2

Trust: 1.6

vendor:asteriskmodel:open sourcescope:eqversion:1.2.32

Trust: 1.6

vendor:asteriskmodel:open sourcescope:eqversion:1.2.33

Trust: 1.6

vendor:asteriskmodel:appliance s800iscope:eqversion:1.3

Trust: 1.6

vendor:asteriskmodel:open sourcescope:eqversion:1.2.31

Trust: 1.6

vendor:asteriskmodel:opensourcescope:eqversion:1.4.23.2

Trust: 1.6

vendor:asteriskmodel:open sourcescope:eqversion:1.2.22

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.9

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.10

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.12

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.23

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.30.4

Trust: 1.0

vendor:sangomamodel:asteriskscope:eqversion:1.6.1.4

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.21.1

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.6.0.3

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.12.1

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.23

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.19.2

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.9

Trust: 1.0

vendor:asteriskmodel:asteriskscope:eqversion:c.1.0_beta7

Trust: 1.0

vendor:asteriskmodel:asteriskscope:eqversion:b.2.2.0

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.14

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.13

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.26.1

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4beta

Trust: 1.0

vendor:asteriskmodel:asteriskscope:eqversion:b.2.5.9

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.26.2

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.17

Trust: 1.0

vendor:asteriskmodel:asteriskscope:eqversion:c.2.1.2.1

Trust: 1.0

vendor:asteriskmodel:asteriskscope:eqversion:b.2.5.5

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.16

Trust: 1.0

vendor:asteriskmodel:asteriskscope:eqversion:c.3.1.0

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.8

Trust: 1.0

vendor:asteriskmodel:asteriskscope:eqversion:b.2.5.4

Trust: 1.0

vendor:asteriskmodel:asteriskscope:eqversion:c.1.6

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.14

Trust: 1.0

vendor:asteriskmodel:asteriskscope:eqversion:b.2.5.1

Trust: 1.0

vendor:sangomamodel:asteriskscope:eqversion:1.6.1

Trust: 1.0

vendor:asteriskmodel:asteriskscope:eqversion:b.2.3.6

Trust: 1.0

vendor:asteriskmodel:asteriskscope:eqversion:b.2.5.3

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.6.0.1

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.3

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.21

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.6.0

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.10.1

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.7

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.19

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.16.2

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.6.0.2

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.19

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.7.1

Trust: 1.0

vendor:asteriskmodel:asteriskscope:eqversion:c.2.4.2

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.17

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.5

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.7

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.21.2

Trust: 1.0

vendor:asteriskmodel:asteriskscope:eqversion:b.2.3.3

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.2

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.27

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.18

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.13

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.21

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.6.1.0

Trust: 1.0

vendor:asteriskmodel:asteriskscope:eqversion:b.1.3.2

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.21.1

Trust: 1.0

vendor:asteriskmodel:asteriskscope:eqversion:b.2.3.2

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.16

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.1

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.30

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.22.1

Trust: 1.0

vendor:asteriskmodel:asteriskscope:eqversion:c.1.8.1

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.11

Trust: 1.0

vendor:asteriskmodel:asteriskscope:eqversion:b.2.5.8

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.12

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.18

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.19.1

Trust: 1.0

vendor:asteriskmodel:asteriskscope:eqversion:c.1.0_beta8

Trust: 1.0

vendor:asteriskmodel:asteriskscope:eqversion:c.1.10.4

Trust: 1.0

vendor:asteriskmodel:asteriskscope:eqversion:c.2.3

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.30.3

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.9.1

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.15

Trust: 1.0

vendor:asteriskmodel:asteriskscope:eqversion:b.2.3.1

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.7.1

Trust: 1.0

vendor:asteriskmodel:asteriskscope:eqversion:c.2.3.3

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.0

Trust: 1.0

vendor:asteriskmodel:asteriskscope:eqversion:c.1.6.1

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.1

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.3

Trust: 1.0

vendor:asteriskmodel:asteriskscope:eqversion:c.1.10.5

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.6

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.20

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.4

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.11

Trust: 1.0

vendor:asteriskmodel:asteriskscope:eqversion:b.2.5.6

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.2

Trust: 1.0

vendor:asteriskmodel:asteriskscope:eqversion:c.1.6.2

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.8

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.28

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.6.1.5

Trust: 1.0

vendor:asteriskmodel:asteriskscope:eqversion:b.1.3.3

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.30.2

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.22.2

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.6

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.12.1

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.25

Trust: 1.0

vendor:asteriskmodel:opensourcescope:eqversion:1.4.26.1

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.10

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.15

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.26

Trust: 1.0

vendor:asteriskmodel:asteriskscope:eqversion:b.2.3.5

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.5

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.4

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.16.1

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.18.1

Trust: 1.0

vendor:asteriskmodel:asteriskscope:eqversion:b.2.2.1

Trust: 1.0

vendor:asteriskmodel:asteriskscope:eqversion:b.2.3.4

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.0

Trust: 1.0

vendor:asteriskmodel:asteriskscope:eqversion:c.1.10.3

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.22

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.4.20

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.24

Trust: 1.0

vendor:asteriskmodel:open sourcescope:eqversion:1.2.29

Trust: 1.0

vendor:digiummodel:appliance s800iscope:ltversion:1.3.x

Trust: 0.8

vendor:digiummodel:asteriskscope:eqversion:business edition of b.2.5.10

Trust: 0.8

vendor:digiummodel:asteriskscope:ltversion:b.x.x

Trust: 0.8

vendor:digiummodel:asterisk open sourcescope:ltversion:1.4.x

Trust: 0.8

vendor:digiummodel:asterisk open sourcescope:ltversion:1.6.0.x

Trust: 0.8

vendor:digiummodel:asterisk open sourcescope:eqversion:1.6.0.15

Trust: 0.8

vendor:digiummodel:asterisk open sourcescope:ltversion:1.2.x

Trust: 0.8

vendor:digiummodel:asteriskscope:eqversion:c.2.4.3

Trust: 0.8

vendor:digiummodel:asterisk open sourcescope:eqversion:1.4.26.2

Trust: 0.8

vendor:digiummodel:asterisk open sourcescope:eqversion:1.2.35

Trust: 0.8

vendor:digiummodel:asteriskscope:ltversion:c.2.4.3

Trust: 0.8

vendor:digiummodel:asteriskscope:eqversion:c.3.1.1

Trust: 0.8

vendor:digiummodel:asterisk open sourcescope:ltversion:1.6.1.x

Trust: 0.8

vendor:digiummodel:appliance s800iscope:eqversion:1.3.0.3

Trust: 0.8

vendor:digiummodel:asterisk open sourcescope:eqversion:1.6.1.6

Trust: 0.8

vendor:digiummodel:asteriskscope:ltversion:c.3.x

Trust: 0.8

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:asteriskmodel:s800i appliancescope:eqversion:1.3.2

Trust: 0.3

vendor:asteriskmodel:s800i appliancescope:eqversion:1.3

Trust: 0.3

vendor:asteriskmodel:business edition c.3.1.0scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition c.2.4.2scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition c.2.3.3scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition c.2.3scope:eqversion:.2

Trust: 0.3

vendor:asteriskmodel:business edition c.2.3scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition c.2.1.2.1scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition c.1.8.1scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition c.1.6.2scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition c.1.6.1scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition c.1.6scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition c.1.10.5scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition c.1.10.4scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition c.1.10.3scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition c.1.0-beta8scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition c.1.0-beta7scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition b.2.5.9scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition b.2.5.8scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition b.2.5.6scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition b.2.5.5scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition b.2.5.4scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition b.2.5.3scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition b.2.5.2scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition b.2.5.1scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition b.2.5scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition b.2.3.6scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition b.2.3.5scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition b.2.3.4scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition b.2.3.3scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition b.2.3.2scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition b.2.3.1scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition b.2.2.1scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition b.2.2.0scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition b.1.3.3scope: - version: -

Trust: 0.3

vendor:asteriskmodel:business edition b.1.3.2scope: - version: -

Trust: 0.3

vendor:asteriskmodel:0-rc2scope:eqversion:1.6.1

Trust: 0.3

vendor:asteriskmodel:0-rc1scope:eqversion:1.6.1

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.6.1.5

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.6.1

Trust: 0.3

vendor:asteriskmodel:beta6scope:eqversion:1.6

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.66

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.6.8

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.4.26

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.4.24.1

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.4.24

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.4.23.2

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.4.23.1

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.4.23

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.4.22

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.4.19.1

Trust: 0.3

vendor:asteriskmodel:-rc3scope:eqversion:1.4.19

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.4.19

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.4.18

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.4.17

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.4.16

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.4.15

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.4.14

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.4.13

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.4.12

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.4.11

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.4.10

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.4.9

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.4.8

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.4.7

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.4.6

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.4.5

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.4.4

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.4.3

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.4.2

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.4.1

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.2.34

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.2.33

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.2.32

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.2.31

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.2.30

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.2.29

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.2.28

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.2.27

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.2.26

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.2.25

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.2.24

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.2.23

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.2.22

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.2.21

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.2.19

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.2.18

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.2.17

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.2.16

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.2.15

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.2.14

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.2.13

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.2.11

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.2.10

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.2.9

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.2.8

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.2.7

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.2.6

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.2.5

Trust: 0.3

vendor:asteriskmodel:.0-beta2scope:eqversion:1.2

Trust: 0.3

vendor:asteriskmodel:.0-beta1scope:eqversion:1.2

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.6.0.3

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.6.0.14

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.6

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.4.26.1

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.4.22.1

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.4.21.2

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.4.18.1

Trust: 0.3

vendor:asteriskmodel:revisionscope:eqversion:1.495946

Trust: 0.3

vendor:asteriskmodel:betascope:eqversion:1.4

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.2.30.4

Trust: 0.3

vendor:asteriskmodel:asteriskscope:eqversion:1.2.30.3

Trust: 0.3

vendor:asteriskmodel:s800i appliancescope:neversion:1.3.0.3

Trust: 0.3

vendor:asteriskmodel:business edition c.3.1scope:neversion:1

Trust: 0.3

vendor:asteriskmodel:business edition c.2.4.3scope:neversion: -

Trust: 0.3

vendor:asteriskmodel:business edition b.2.5.10scope:neversion: -

Trust: 0.3

vendor:asteriskmodel:asteriskscope:neversion:1.6.1.6

Trust: 0.3

vendor:asteriskmodel:asteriskscope:neversion:1.2.35

Trust: 0.3

vendor:asteriskmodel:asteriskscope:neversion:1.6.0.15

Trust: 0.3

vendor:asteriskmodel:asteriskscope:neversion:1.4.26.2

Trust: 0.3

sources: BID: 36275 // JVNDB: JVNDB-2009-003591 // CNNVD: CNNVD-200909-091 // NVD: CVE-2009-2346

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-2346
value: HIGH

Trust: 1.0

NVD: CVE-2009-2346
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200909-091
value: HIGH

Trust: 0.6

VULMON: CVE-2009-2346
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2009-2346
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

sources: VULMON: CVE-2009-2346 // JVNDB: JVNDB-2009-003591 // CNNVD: CNNVD-200909-091 // NVD: CVE-2009-2346

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

sources: JVNDB: JVNDB-2009-003591 // NVD: CVE-2009-2346

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 90288 // CNNVD: CNNVD-200909-091

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200909-091

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-003591

PATCH

title:AST-2009-006url:http://downloads.asterisk.org/pub/security/AST-2009-006.html

Trust: 0.8

sources: JVNDB: JVNDB-2009-003591

EXTERNAL IDS

db:NVDid:CVE-2009-2346

Trust: 3.0

db:BIDid:36275

Trust: 2.0

db:SECUNIAid:36593

Trust: 1.8

db:SECTRACKid:1022819

Trust: 1.6

db:JVNDBid:JVNDB-2009-003591

Trust: 0.8

db:BUGTRAQid:20090903 AST-2009-006: IAX2 CALL NUMBER RESOURCE EXHAUSTION

Trust: 0.6

db:CNNVDid:CNNVD-200909-091

Trust: 0.6

db:VULMONid:CVE-2009-2346

Trust: 0.1

db:SECUNIAid:34229

Trust: 0.1

db:PACKETSTORMid:75661

Trust: 0.1

db:PACKETSTORMid:80978

Trust: 0.1

db:SECUNIAid:36889

Trust: 0.1

db:PACKETSTORMid:81677

Trust: 0.1

db:PACKETSTORMid:90288

Trust: 0.1

db:PACKETSTORMid:81003

Trust: 0.1

db:SECUNIAid:36227

Trust: 0.1

db:PACKETSTORMid:80408

Trust: 0.1

sources: VULMON: CVE-2009-2346 // BID: 36275 // JVNDB: JVNDB-2009-003591 // PACKETSTORM: 75661 // PACKETSTORM: 80978 // PACKETSTORM: 81677 // PACKETSTORM: 90288 // PACKETSTORM: 81003 // PACKETSTORM: 80408 // CNNVD: CNNVD-200909-091 // NVD: CVE-2009-2346

REFERENCES

url:http://downloads.asterisk.org/pub/security/ast-2009-006.html

Trust: 2.1

url:http://www.securityfocus.com/bid/36275

Trust: 1.8

url:http://secunia.com/advisories/36593

Trust: 1.7

url:http://securitytracker.com/id?1022819

Trust: 1.7

url:http://www.securityfocus.com/archive/1/506257/100/0/threaded

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2346

Trust: 0.9

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-2346

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/506257/100/0/threaded

Trust: 0.6

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.4

url:http://secunia.com/advisories/business_solutions/

Trust: 0.4

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.4

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.4

url:http://www.asterisk.org/

Trust: 0.3

url:/archive/1/506257

Trust: 0.3

url:http://secunia.com/advisories/34229/

Trust: 0.2

url:http://downloads.asterisk.org/pub/security/ast-2009-006-1.2.diff.txt

Trust: 0.2

url:http://downloads.asterisk.org/pub/security/ast-2009-006-1.4.diff.txt

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2009-2346

Trust: 0.2

url:http://secunia.com/advisories/36227/

Trust: 0.2

url:http://secunia.com/advisories/36593/

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://downloads.digium.com/pub/security/ast-2009-002.html

Trust: 0.1

url:http://secunia.com/advisories/try_vi/

Trust: 0.1

url:https://issues.asterisk.org/view.php?id=12912

Trust: 0.1

url:http://downloads.digium.com/pub/security/ast-2009-006.html

Trust: 0.1

url:http://downloads.asterisk.org/pub/security/ast-2009-006-1.6.0.diff.txt|1.6.0

Trust: 0.1

url:http://www.beyondsecurity.com/ssd.html

Trust: 0.1

url:http://www.rfc-editor.org/authors/rfc5456.txt

Trust: 0.1

url:http://www.asterisk.org/security

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:http://downloads.asterisk.org/pub/security/ast-2009-006-1.6.1.diff.txt|1.6.1

Trust: 0.1

url:http://downloads.digium.com/pub/security/ast-2009-006.pdf

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

url:http://secunia.com/advisories/36889/

Trust: 0.1

url:https://www.redhat.com/archives/fedora-package-announce/2009-september/msg00783.html

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-4055

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3727

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3727

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201006-20.xml

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4055

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-7220

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-7220

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-2726

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2726

Trust: 0.1

url:http://downloads.asterisk.org/pub/security/ast-2009-006-1.6.0.diff.txt

Trust: 0.1

url:http://downloads.asterisk.org/pub/security/ast-2009-006-1.6.1.diff.txt

Trust: 0.1

url:http://downloads.digium.com/pub/security/ast-2009-005-1.4.diff.txt

Trust: 0.1

url:http://downloads.digium.com/pub/security/ast-2009-005-1.6.0.diff.txt

Trust: 0.1

url:http://downloads.digium.com/pub/security/ast-2009-005-1.6.2.diff.txt

Trust: 0.1

url:http://labs.mudynamics.com/advisories/mu-200908-01.txt

Trust: 0.1

url:http://downloads.asterisk.org/pub/security/ast-2009-005.html

Trust: 0.1

url:http://downloads.digium.com/pub/security/ast-2009-005-1.6.1.diff.txt

Trust: 0.1

url:http://downloads.digium.com/pub/security/ast-2009-005-1.2.diff.txt

Trust: 0.1

url:http://downloads.digium.com/pub/security/ast-2009-005-trunk.diff.txt

Trust: 0.1

sources: VULMON: CVE-2009-2346 // BID: 36275 // JVNDB: JVNDB-2009-003591 // PACKETSTORM: 75661 // PACKETSTORM: 80978 // PACKETSTORM: 81677 // PACKETSTORM: 90288 // PACKETSTORM: 81003 // PACKETSTORM: 80408 // CNNVD: CNNVD-200909-091 // NVD: CVE-2009-2346

CREDITS

Russell Bryant russell@digium.com

Trust: 0.6

sources: CNNVD: CNNVD-200909-091

SOURCES

db:VULMONid:CVE-2009-2346
db:BIDid:36275
db:JVNDBid:JVNDB-2009-003591
db:PACKETSTORMid:75661
db:PACKETSTORMid:80978
db:PACKETSTORMid:81677
db:PACKETSTORMid:90288
db:PACKETSTORMid:81003
db:PACKETSTORMid:80408
db:CNNVDid:CNNVD-200909-091
db:NVDid:CVE-2009-2346

LAST UPDATE DATE

2024-11-23T21:05:16.396000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2009-2346date:2018-10-10T00:00:00
db:BIDid:36275date:2015-04-13T22:21:00
db:JVNDBid:JVNDB-2009-003591date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200909-091date:2009-09-09T00:00:00
db:NVDid:CVE-2009-2346date:2024-11-21T01:04:39.463

SOURCES RELEASE DATE

db:VULMONid:CVE-2009-2346date:2009-09-08T00:00:00
db:BIDid:36275date:2009-09-03T00:00:00
db:JVNDBid:JVNDB-2009-003591date:2012-06-26T00:00:00
db:PACKETSTORMid:75661date:2009-03-11T08:30:33
db:PACKETSTORMid:80978date:2009-09-04T01:28:46
db:PACKETSTORMid:81677date:2009-09-28T05:54:05
db:PACKETSTORMid:90288date:2010-06-04T05:34:39
db:PACKETSTORMid:81003date:2009-09-04T15:24:50
db:PACKETSTORMid:80408date:2009-08-17T09:58:53
db:CNNVDid:CNNVD-200909-091date:2009-09-08T00:00:00
db:NVDid:CVE-2009-2346date:2009-09-08T18:30:00.203