Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2008-2119 — Improper Input Validation in Asterisk
Severity
4.3MEDIUMNVD
EPSS
10.1%
top 6.87%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJun 4
Latest updateMay 1
Description
Asterisk Open Source 1.0.x and 1.2.x before 1.2.29 and Business Edition A.x.x and B.x.x before B.2.5.3, when pedantic parsing (aka pedanticsipchecking) is enabled, allows remote attackers to cause a denial of service (daemon crash) via a SIP INVITE message that lacks a From header, related to invocations of the ast_uri_decode function, and improper handling of (1) an empty const string and (2) a NULL pointer.
CVSS vector
AV:N/AC:M/C:N/I:N/A:PExploitability: 8.6 | Impact: 2.9
Affected Packages4 packages
🔴Vulnerability Details
2💥Exploits & PoCs
1📋Vendor Advisories
1Debian▶
CVE-2008-2119: asterisk - Asterisk Open Source 1.0.x and 1.2.x before 1.2.29 and Business Edition A.x.x an...↗2008