Vulnerability Details CVE-2008-2543
The ooh323 channel driver in Asterisk Addons 1.2.x before 1.2.9 and Asterisk-Addons 1.4.x before 1.4.7 creates a remotely accessible TCP port that is intended solely for localhost communication, and interprets some TCP application-data fields as addresses of memory to free, which allows remote attackers to cause a denial of service (daemon crash) via crafted TCP packets.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.018
EPSS Ranking 82.1%
CVSS Severity
CVSS v2 Score 5.0
Products affected by CVE-2008-2543
-
cpe:2.3:a:asterisk:asterisk-addons:1.2.0
-
cpe:2.3:a:asterisk:asterisk-addons:1.2.1
-
cpe:2.3:a:asterisk:asterisk-addons:1.2.2
-
cpe:2.3:a:asterisk:asterisk-addons:1.2.3
-
cpe:2.3:a:asterisk:asterisk-addons:1.2.4
-
cpe:2.3:a:asterisk:asterisk-addons:1.2.5
-
cpe:2.3:a:asterisk:asterisk-addons:1.2.6
-
cpe:2.3:a:asterisk:asterisk-addons:1.2.7
-
cpe:2.3:a:asterisk:asterisk-addons:1.2.8
-
cpe:2.3:a:asterisk:asterisk-addons:1.4.0
-
cpe:2.3:a:asterisk:asterisk-addons:1.4.1
-
cpe:2.3:a:asterisk:asterisk-addons:1.4.2
-
cpe:2.3:a:asterisk:asterisk-addons:1.4.3
-
cpe:2.3:a:asterisk:asterisk-addons:1.4.4
-
cpe:2.3:a:asterisk:asterisk-addons:1.4.5
-
cpe:2.3:a:asterisk:asterisk-addons:1.4.6