ID CVE-2007-2294
Summary The Manager Interface in Asterisk before 1.2.18 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (crash) by using MD5 authentication to authenticate a user that does not have a password defined in manager.conf, resulting in a NULL pointer dereference. Successful exploitation requires that the Management Interface is enabled and a user without a password is configured in the manager.conf file.
References
Vulnerable Configurations
  • cpe:2.3:a:asterisk:asterisk:1.2.0_beta1:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.2.0_beta1:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.2.0_beta2:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.2.0_beta2:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.2.10:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.2.11:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.2.11:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.2.12:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.2.12:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.2.13:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.2.13:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.2.14:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.2.14:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.2.15:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.2.15:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.2.16:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.2.16:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.2.17:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.2.17:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*
CVSS
Base: 7.8 (as of 16-10-2018 - 16:43)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:C
refmap via4
bid 23649
bugtraq 20070425 ASA-2007-012: Remote Crash Vulnerability in Manager Interface
confirm http://www.asterisk.org/files/ASA-2007-012.pdf
debian DSA-1358
osvdb 35369
sectrack 1017955
secunia
  • 24977
  • 25582
sreason 2646
suse SUSE-SA:2007:034
vupen ADV-2007-1534
xf asterisk-interface-dos(33886)
Last major update 16-10-2018 - 16:43
Published 26-04-2007 - 20:19
Last modified 16-10-2018 - 16:43
Back to Top