CVE Reference: CVE-2008-1897

NOTE: The text on this page is written by CVE MITRE and reflects neither the opinions of Secunia or the results of our research. All data on this page is written and maintained by CVE MITRE.

Original Page at CVE MITRE:
CVE-2008-1897

Description:
The IAX2 channel driver (chan_iax2) in Asterisk Open Source 1.0.x, 1.2.x before 1.2.28, and 1.4.x before 1.4.19.1; Business Edition A.x.x, B.x.x before B.2.5.2, and C.x.x before C.1.8.1; AsteriskNOW before 1.0.3; Appliance Developer Kit 0.x.x; and s800i before 1.1.0.3, when configured to allow unauthenticated calls, does not verify that an ACK response contains a call number matching the server's reply to a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed ACK response that does not complete a 3-way handshake. NOTE: this issue exists because of an incomplete fix for CVE-2008-1923.

CVE Status:
Candidate

References:

XF
  http://xforce.iss.net/xforce/xfdb/41966

ST
  1019918

SAID
  Secunia Advisory: SA34982
  Secunia Advisory: SA29927
  Secunia Advisory: SA30010
  Secunia Advisory: SA30042

MISC
  http://www.altsci.com/concepts/page.php?s=asteri&p=2

GENTOO
  http://security.gentoo.org/glsa/glsa-200905-01.xml

FEDORA

DEBIAN
  http://www.debian.org/security/2008/dsa-1563

CONFIRM
  http://downloads.digium.com/pub/security/AST-2008-006.html
  http://bugs.digium.com/view.php?id=10078

BUGTRAQ
  http://www.securityfocus.com/archive/1/archive/1/491220/100/0/threaded

BID
  28901


Return to the previous page.