Show plain JSON{"id": "CVE-2008-2119", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2008-06-04T19:32:00.000", "references": [{"url": "http://bugs.digium.com/view.php?id=12607", "source": "cve@mitre.org"}, {"url": "http://downloads.digium.com/pub/security/AST-2008-008.html", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/30517", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/34982", "source": "cve@mitre.org"}, {"url": "http://security.gentoo.org/glsa/glsa-200905-01.xml", "source": "cve@mitre.org"}, {"url": "http://svn.digium.com/view/asterisk?view=rev&revision=120109", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/493020/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securitytracker.com/id?1020166", "source": "cve@mitre.org"}, {"url": "http://www.vupen.com/english/advisories/2008/1731", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42823", "source": "cve@mitre.org"}, {"url": "https://www.exploit-db.com/exploits/5749", "source": "cve@mitre.org"}, {"url": "http://bugs.digium.com/view.php?id=12607", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://downloads.digium.com/pub/security/AST-2008-008.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/30517", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/34982", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://security.gentoo.org/glsa/glsa-200905-01.xml", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://svn.digium.com/view/asterisk?view=rev&revision=120109", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/493020/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id?1020166", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2008/1731", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42823", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.exploit-db.com/exploits/5749", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-20"}]}], "descriptions": [{"lang": "en", "value": "Asterisk Open Source 1.0.x and 1.2.x before 1.2.29 and Business Edition A.x.x and B.x.x before B.2.5.3, when pedantic parsing (aka pedanticsipchecking) is enabled, allows remote attackers to cause a denial of service (daemon crash) via a SIP INVITE message that lacks a From header, related to invocations of the ast_uri_decode function, and improper handling of (1) an empty const string and (2) a NULL pointer."}, {"lang": "es", "value": "Asterisk Open Source 1.0.x y 1.2.x anterior 1.2.29 y Business Edition A.x.x y B.x.x anterior B.2.5.3, cuando \"pedantic parsing\" (tambi\u00e9n conocido como pedanticsipchecking) est\u00e1 activado, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de demonio) a trav\u00e9s de un mensaje SIP INVITE que carece de una cabecera From, relacionado con la invocaci\u00f3n de la funci\u00f3n ast_uri_decode y el manejo incorrecto de (1) una cadena const vac\u00eda y (2) un puntero NULL."}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "366DB62C-2E86-4614-AD9D-90C2F21434CB", "versionEndIncluding": "b2.5.2"}, {"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "802F8680-AB38-41AF-BFC8-F6927F6B1626"}, {"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BCAE8D90-B032-4C60-B487-BE655D00FFAE"}, {"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB64A872-B7B8-46A8-81E4-49EDAC160531"}, {"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21000270-C9B9-430C-A252-763887A15835"}, {"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12F7CF45-5482-4947-8F1D-48C746987475"}, {"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B64995D-7892-49AB-A89D-A5D15615C5D9"}, {"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0397DBD4-EA00-444A-9008-4932F99DF325"}, {"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6FCD865F-BC39-4255-A797-6E5945773337"}, {"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4956871-4DD3-4299-8BEB-9D98A4449A42"}, {"criteria": "cpe:2.3:a:asterisk:asterisk_business_edition:b2.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8936B494-E647-498B-8380-AE4DAD458533"}, {"criteria": "cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6CF7D9C2-C6B3-40E9-92B8-C504656BB176", "versionEndIncluding": "1.2.28"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "678DB154-4363-42FF-8B28-367923FC6595"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E8F2C378-FF0E-4765-9F66-625C4064D5CF"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A55A9295-F632-4856-90A1-38371EB98589"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7FAE6AF1-884D-41F7-B174-9E13C7719C99"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DCA9E35B-9A6B-42F2-9315-9C7D09F62227"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DDF7EC20-A424-45E5-B7E4-3CC86075858C"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C790E105-55C8-4CDC-9FA8-E1FF6F130A67"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44C860EF-2B29-4995-B942-000CC43FDD14"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1ADB80EF-C724-44BA-88FC-24087799D0C6"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "78B39BE8-7E2D-42DF-8633-44CAD5662777"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F39036E3-0027-4C72-9DEB-9A6E2B4512C4"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.0.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A037E6F9-3EF7-4EEB-AC16-081421BCE40D"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.0.11.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6A7EC02A-9C9E-4589-BBB3-1908D3078A7B"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.0.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C70FA9C-6F3B-4BDF-97FB-81D06AB0EE65"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F7971E1-F136-4ADC-95EC-BC4F92E838CF"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.2.0beta1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7435F043-F92B-4635-93CC-A2C39AAE1BCA"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.2.0beta2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C7B2F43B-8B69-4BF6-86B7-A225175FF068"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27202966-2C41-4964-9497-1887D2A834C0"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1471B5A2-15BE-4E7C-BA49-2E6002F7C8EC"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E79CCE5-C29B-4726-8D2F-BC20F70959BA"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F29C13DB-6F04-4B41-90A2-2408D70F3641"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F4F734E-0E78-4957-B323-8E9FBA7FF15C"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A4B117B-E945-4033-A79D-10DFAA3DF18B"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA6D866F-8189-4FFD-AA24-47C0A015C246"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.2.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A4EBFB79-C269-4132-BFAB-451F66CE8289"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9E1028E-2C07-4BA3-B891-FA853A87B280"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E74F577-70BD-4FAF-BCFD-10CD21FC5601"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57BB03E2-E61C-4A94-82DF-8720698CE271"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B30A36F-5CE6-4246-8752-176FB5999C1A"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0F76DFD-4DAC-4B02-8967-B242CDEEF6C9"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6A59BC20-3217-4584-9196-D1CD9E0D6B52"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56F728BA-FC9E-4EEE-9A08-C9C7433BD8D9"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C64DF29-5B3D-401E-885E-8E37FD577254"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A7BF52A-2FF8-40ED-B757-28A1101DE8F5"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A321C2D-852B-4498-ADD6-79956410AB94"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D5F0DCF-C6A2-4A09-90C9-D70F174FDEF5"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C820538E-14EC-43C1-80DB-6AAE4905EF0B"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.2.26:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9562112-2505-4F78-86DE-F30EFAEE47D5"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A6D8FD0-C8C1-4868-9AF1-96B1949C18AE"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "72A840B4-216B-4063-997F-791FBC8C8658"}, {"criteria": "cpe:2.3:a:asterisk:open_source:1.2.27:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE47A547-26E7-48F9-B0A6-2F65E04A1EDE"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}