Vulnerability Description
The ooh323 channel driver in Asterisk Addons 1.2.x before 1.2.9 and Asterisk-Addons 1.4.x before 1.4.7 creates a remotely accessible TCP port that is intended solely for localhost communication, and interprets some TCP application-data fields as addresses of memory to free, which allows remote attackers to cause a denial of service (daemon crash) via crafted TCP packets.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Asterisk | Asterisk-Addons | 1.2.0 |
Related Weaknesses (CWE)
References
- http://downloads.digium.com/pub/security/AST-2008-009.html
- http://secunia.com/advisories/30555
- http://securitytracker.com/id?1020202
- http://www.securityfocus.com/archive/1/493122/100/0/threaded
- http://www.securityfocus.com/archive/1/493144/100/0/threaded
- http://www.securityfocus.com/bid/29567
- http://www.vupen.com/english/advisories/2008/1747/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42869
- http://downloads.digium.com/pub/security/AST-2008-009.html
- http://secunia.com/advisories/30555
- http://securitytracker.com/id?1020202
- http://www.securityfocus.com/archive/1/493122/100/0/threaded
- http://www.securityfocus.com/archive/1/493144/100/0/threaded
- http://www.securityfocus.com/bid/29567
- http://www.vupen.com/english/advisories/2008/1747/references
FAQ
What is CVE-2008-2543?
CVE-2008-2543 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The ooh323 channel driver in Asterisk Addons 1.2.x before 1.2.9 and Asterisk-Addons 1.4.x before 1.4.7 creates a remotely accessible TCP port that is intended solely for localhost communication, and i...
How severe is CVE-2008-2543?
CVE-2008-2543 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-2543?
Check the references section above for vendor advisories and patch information. Affected products include: Asterisk Asterisk-Addons.