CVE Vulnerabilities

CVE-2008-5558

Improper Authentication

Published: Dec 17, 2008 | Modified: Apr 09, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Asterisk Open Source 1.2.26 through 1.2.30.3 and Business Edition B.2.3.5 through B.2.5.5, when realtime IAX2 users are enabled, allows remote attackers to cause a denial of service (crash) via authentication attempts involving (1) an unknown user or (2) a user using hostname matching.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

NameVendorStart VersionEnd Version
Asterisk_business_editionAsteriskb.2.3.4 (including)b.2.3.4 (including)
Asterisk_business_editionAsteriskb.2.3.5 (including)b.2.3.5 (including)
Asterisk_business_editionAsteriskb.2.5.0 (including)b.2.5.0 (including)
Asterisk_business_editionAsteriskb.2.5.1 (including)b.2.5.1 (including)
Asterisk_business_editionAsteriskb.2.5.3 (including)b.2.5.3 (including)
Open_sourceAsterisk1.2.26 (including)1.2.26 (including)
Open_sourceAsterisk1.2.26-netsec (including)1.2.26-netsec (including)
Open_sourceAsterisk1.2.26.1 (including)1.2.26.1 (including)
Open_sourceAsterisk1.2.26.1-netsec (including)1.2.26.1-netsec (including)
Open_sourceAsterisk1.2.26.2 (including)1.2.26.2 (including)
Open_sourceAsterisk1.2.26.2-netsec (including)1.2.26.2-netsec (including)
Open_sourceAsterisk1.2.27 (including)1.2.27 (including)
Open_sourceAsterisk1.2.28 (including)1.2.28 (including)
Open_sourceAsterisk1.2.29 (including)1.2.29 (including)
Open_sourceAsterisk1.2.30 (including)1.2.30 (including)
Open_sourceAsterisk1.2.30.2 (including)1.2.30.2 (including)
Open_sourceAsterisk1.2.30.3 (including)1.2.30.3 (including)
AsteriskUbuntudapper*

Potential Mitigations

References