Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2008-1289Improper Restriction of Operations within the Bounds of a Memory Buffer in Asterisk

Severity
7.5HIGHNVD
EPSS
25.0%
top 3.82%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedMar 24
Latest updateMay 1

Description

Multiple buffer overflows in Asterisk Open Source 1.4.x before 1.4.18.1 and 1.4.19-rc3, Open Source 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6.1, AsteriskNOW 1.0.x before 1.0.2, Appliance Developer Kit before 1.4 revision 109386, and s800i 1.1.x before 1.1.0.2 allow remote attackers to (1) write a zero to an arbitrary memory location via a large RTP payload number, related to the ast_rtp_unset_m_type function in main/rtp.c; or (2) write certain integers to an arbitrary memory

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages7 packages

🔴Vulnerability Details

2
GHSA
GHSA-xjqv-ch5c-vc5h: Multiple buffer overflows in Asterisk Open Source 12022-05-01
OSV
CVE-2008-1289: Multiple buffer overflows in Asterisk Open Source 12008-03-24

💥Exploits & PoCs

1
Exploit-DB
Asterisk 1.4.x - RTP Codec Payload Handling Multiple Buffer Overflow Vulnerabilities2008-03-18

📋Vendor Advisories

3
Red Hat
mysql: incomplete upstream fix for CVE-2008-20792008-07-03
Debian
CVE-2008-1289: asterisk - Multiple buffer overflows in Asterisk Open Source 1.4.x before 1.4.18.1 and 1.4....2008
Red Hat
asterisk: Two buffer overflows in RTP Codec Payload Handling (AST-2008-002)

💬Community

1
Bugzilla
CVE-2008-1289 asterisk: Two buffer overflows in RTP Codec Payload Handling (AST-2008-002)2008-03-19
CVE-2008-1289 — Debian Asterisk vulnerability | cvebase