CVE Vulnerabilities

CVE-2008-1333

Use of Externally-Controlled Format String

Published: Mar 20, 2008 | Modified: Nov 21, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
5.8 MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
LOW

Format string vulnerability in Asterisk Open Source 1.6.x before 1.6.0-beta6 might allow remote attackers to execute arbitrary code via logging messages that are not properly handled by (1) the ast_verbose logging API call, or (2) the astman_append function.

Weakness

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.

Affected Software

Name Vendor Start Version End Version
Open_source Asterisk 1.6.0_beta1 (including) 1.6.0_beta1 (including)
Open_source Asterisk 1.6.0_beta2 (including) 1.6.0_beta2 (including)
Open_source Asterisk 1.6.0_beta3 (including) 1.6.0_beta3 (including)
Open_source Asterisk 1.6.0_beta4 (including) 1.6.0_beta4 (including)
Open_source Asterisk 1.6.0_beta5 (including) 1.6.0_beta5 (including)
Asterisk Ubuntu dapper *
Asterisk Ubuntu devel *
Asterisk Ubuntu edgy *
Asterisk Ubuntu feisty *
Asterisk Ubuntu gutsy *
Asterisk Ubuntu hardy *
Asterisk Ubuntu intrepid *
Asterisk Ubuntu jaunty *
Asterisk Ubuntu karmic *

Potential Mitigations

References