CVE-2008-1897

CVSS V2 Medium 4.3 CVSS V3 None
Description
The IAX2 channel driver (chan_iax2) in Asterisk Open Source 1.0.x, 1.2.x before 1.2.28, and 1.4.x before 1.4.19.1; Business Edition A.x.x, B.x.x before B.2.5.2, and C.x.x before C.1.8.1; AsteriskNOW before 1.0.3; Appliance Developer Kit 0.x.x; and s800i before 1.1.0.3, when configured to allow unauthenticated calls, does not verify that an ACK response contains a call number matching the server's reply to a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed ACK response that does not complete a 3-way handshake. NOTE: this issue exists because of an incomplete fix for CVE-2008-1923.
Overview
  • CVE ID
  • CVE-2008-1897
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Modified
  • Published Version
  • 2008-04-23T16:05:00
  • Last Modified Date
  • 2018-10-11T20:37:48
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:* 1 OR b.2.5.1
cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:* 1 OR c1.8.0
cpe:2.3:a:asterisk:asterisk_business_edition:a:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0:beta7:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0:beta8:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:asterisknow:*:*:*:*:*:*:*:* 1 OR 1.0.2
cpe:2.3:a:asterisk:asterisknow:1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:asterisknow:1.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:* 1 OR 1.2.27
cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:* 1 OR 1.4.19
cpe:2.3:a:asterisk:open_source:1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.0:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.0:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.0.3.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.0.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.0.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.0.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.0.11:patch:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.0.11.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.0.11.1:patch:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.0.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.0.12:patch:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.0:beta1:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.0:beta2:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.0:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.0:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.2:netsec:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.3:netsec:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.4:netsec:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.5:netsec:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.6:netsec:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.7:netsec:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.7.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.7.1:netsec:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.8:netsec:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.9.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.9.1:netsec:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.10:netsec:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.11:netsec:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.12:netsec:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.12.1:netsec:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.13:netsec:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.14:netsec:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.15:netsec:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.16:netsec:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.17:netsec:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.18:netsec:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.19:netsec:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.20:netsec:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.21:netsec:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.21.1:netsec:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.22:netsec:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.23:netsec:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.24:netsec:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.25:netsec:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.26:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.26:netsec:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.26.1:netsec:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.2.26.2:netsec:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.4.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.4.0:beta2:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.4.0:beta3:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.4.0:beta4:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.4.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.4.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.4.10.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.4.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.4.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.4.12.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.4.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.4.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.4.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.4.16:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.4.16.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.4.16.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.4.17:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.4.18:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:open_source:1.4.18.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:s800i:*:*:*:*:*:*:*:* 1 OR 1.1.0.2
cpe:2.3:a:asterisk:s800i:1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:s800i:1.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:s800i:1.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:s800i:1.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:s800i:1.0.3.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:s800i:1.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:asterisk:s800i:1.1.0.1:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:N/I:N/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • PARTIAL
  • Base Score
  • 4.3
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 2.9
History
Created Old Value New Value Data Type Notes
2022-05-10 18:29:11 Added to TrackCVE