CVE Vulnerabilities

CVE-2008-1333

Use of Externally-Controlled Format String

Published: Mar 20, 2008 | Modified: Apr 09, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
5.8 MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

Format string vulnerability in Asterisk Open Source 1.6.x before 1.6.0-beta6 might allow remote attackers to execute arbitrary code via logging messages that are not properly handled by (1) the ast_verbose logging API call, or (2) the astman_append function.

Weakness

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.

Affected Software

NameVendorStart VersionEnd Version
Open_sourceAsterisk1.6.0_beta1 (including)1.6.0_beta1 (including)
Open_sourceAsterisk1.6.0_beta2 (including)1.6.0_beta2 (including)
Open_sourceAsterisk1.6.0_beta3 (including)1.6.0_beta3 (including)
Open_sourceAsterisk1.6.0_beta4 (including)1.6.0_beta4 (including)
Open_sourceAsterisk1.6.0_beta5 (including)1.6.0_beta5 (including)
AsteriskUbuntudapper*
AsteriskUbuntudevel*
AsteriskUbuntuedgy*
AsteriskUbuntufeisty*
AsteriskUbuntugutsy*
AsteriskUbuntuhardy*
AsteriskUbuntuintrepid*
AsteriskUbuntujaunty*
AsteriskUbuntukarmic*

Potential Mitigations

References