Asterisk Open Source 1.2.26 through 1.2.30.3 and Business Edition B.2.3.5 through B.2.5.5, when realtime IAX2 users are enabled, allows remote attackers to cause a denial of service (crash) via authentication attempts involving (1) an unknown user or (2) a user using hostname matching.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Asterisk_business_edition | Asterisk | b.2.3.4 (including) | b.2.3.4 (including) |
Asterisk_business_edition | Asterisk | b.2.3.5 (including) | b.2.3.5 (including) |
Asterisk_business_edition | Asterisk | b.2.5.0 (including) | b.2.5.0 (including) |
Asterisk_business_edition | Asterisk | b.2.5.1 (including) | b.2.5.1 (including) |
Asterisk_business_edition | Asterisk | b.2.5.3 (including) | b.2.5.3 (including) |
Open_source | Asterisk | 1.2.26 (including) | 1.2.26 (including) |
Open_source | Asterisk | 1.2.26-netsec (including) | 1.2.26-netsec (including) |
Open_source | Asterisk | 1.2.26.1 (including) | 1.2.26.1 (including) |
Open_source | Asterisk | 1.2.26.1-netsec (including) | 1.2.26.1-netsec (including) |
Open_source | Asterisk | 1.2.26.2 (including) | 1.2.26.2 (including) |
Open_source | Asterisk | 1.2.26.2-netsec (including) | 1.2.26.2-netsec (including) |
Open_source | Asterisk | 1.2.27 (including) | 1.2.27 (including) |
Open_source | Asterisk | 1.2.28 (including) | 1.2.28 (including) |
Open_source | Asterisk | 1.2.29 (including) | 1.2.29 (including) |
Open_source | Asterisk | 1.2.30 (including) | 1.2.30 (including) |
Open_source | Asterisk | 1.2.30.2 (including) | 1.2.30.2 (including) |
Open_source | Asterisk | 1.2.30.3 (including) | 1.2.30.3 (including) |
Asterisk | Ubuntu | dapper | * |