Vulnerabilities > Asterisk > Open Source > Medium

DATE CVE VULNERABILITY TITLE RISK
2008-03-20 CVE-2008-1333 USE of Externally-Controlled Format String vulnerability in Asterisk Open Source
Format string vulnerability in Asterisk Open Source 1.6.x before 1.6.0-beta6 might allow remote attackers to execute arbitrary code via logging messages that are not properly handled by (1) the ast_verbose logging API call, or (2) the astman_append function.
network
asterisk CWE-134
5.8
2008-01-08 CVE-2008-0095 Resource Management Errors vulnerability in Asterisk products
The SIP channel driver in Asterisk Open Source 1.4.x before 1.4.17, Business Edition before C.1.0-beta8, AsteriskNOW before beta7, Appliance Developer Kit before Asterisk 1.4 revision 95946, and Appliance s800i 1.0.x before 1.0.3.4 allows remote attackers to cause a denial of service (daemon crash) via a BYE message with an Also (Also transfer) header, which triggers a NULL pointer dereference.
network
low complexity
asterisk CWE-399
5.0
2007-12-20 CVE-2007-6430 Improper Authentication vulnerability in Asterisk Business Edition and Open Source
Asterisk Open Source 1.2.x before 1.2.26 and 1.4.x before 1.4.16, and Business Edition B.x.x before B.2.3.6 and C.x.x before C.1.0-beta8, when using database-based registrations ("realtime") and host-based authentication, does not check the IP address when the username is correct and there is no password, which allows remote attackers to bypass authentication using a valid username.
network
asterisk CWE-287
4.3