Vulnerabilities > Asterisk > Open Source > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2008-03-20 | CVE-2008-1333 | USE of Externally-Controlled Format String vulnerability in Asterisk Open Source Format string vulnerability in Asterisk Open Source 1.6.x before 1.6.0-beta6 might allow remote attackers to execute arbitrary code via logging messages that are not properly handled by (1) the ast_verbose logging API call, or (2) the astman_append function. | 5.8 |
2008-01-08 | CVE-2008-0095 | Resource Management Errors vulnerability in Asterisk products The SIP channel driver in Asterisk Open Source 1.4.x before 1.4.17, Business Edition before C.1.0-beta8, AsteriskNOW before beta7, Appliance Developer Kit before Asterisk 1.4 revision 95946, and Appliance s800i 1.0.x before 1.0.3.4 allows remote attackers to cause a denial of service (daemon crash) via a BYE message with an Also (Also transfer) header, which triggers a NULL pointer dereference. | 5.0 |
2007-12-20 | CVE-2007-6430 | Improper Authentication vulnerability in Asterisk Business Edition and Open Source Asterisk Open Source 1.2.x before 1.2.26 and 1.4.x before 1.4.16, and Business Edition B.x.x before B.2.3.6 and C.x.x before C.1.0-beta8, when using database-based registrations ("realtime") and host-based authentication, does not check the IP address when the username is correct and there is no password, which allows remote attackers to bypass authentication using a valid username. | 4.3 |