5
CVE-2008-2543
- EPSS 1.97%
- Published 05.06.2008 20:32:00
- Last modified 09.04.2025 00:30:58
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
The ooh323 channel driver in Asterisk Addons 1.2.x before 1.2.9 and Asterisk-Addons 1.4.x before 1.4.7 creates a remotely accessible TCP port that is intended solely for localhost communication, and interprets some TCP application-data fields as addresses of memory to free, which allows remote attackers to cause a denial of service (daemon crash) via crafted TCP packets.
Data is provided by the National Vulnerability Database (NVD)
Asterisk ≫ Asterisk-addons Version1.2.0
Asterisk ≫ Asterisk-addons Version1.2.1
Asterisk ≫ Asterisk-addons Version1.2.2
Asterisk ≫ Asterisk-addons Version1.2.3
Asterisk ≫ Asterisk-addons Version1.2.4
Asterisk ≫ Asterisk-addons Version1.2.5
Asterisk ≫ Asterisk-addons Version1.2.6
Asterisk ≫ Asterisk-addons Version1.2.7
Asterisk ≫ Asterisk-addons Version1.2.8
Asterisk ≫ Asterisk-addons Version1.4.0
Asterisk ≫ Asterisk-addons Version1.4.1
Asterisk ≫ Asterisk-addons Version1.4.2
Asterisk ≫ Asterisk-addons Version1.4.3
Asterisk ≫ Asterisk-addons Version1.4.4
Asterisk ≫ Asterisk-addons Version1.4.5
Asterisk ≫ Asterisk-addons Version1.4.6
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 1.97% | 0.82 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:N/A:P
|