製品・ソフトウェアに関する情報
Asterisk Open Source の IAX2 チャネルドライバにおけるサービス運用妨害 (DoS) の脆弱性
Title Asterisk Open Source の IAX2 チャネルドライバにおけるサービス運用妨害 (DoS) の脆弱性
Summary

Asterisk Open Source、Business Edition、AsteriskNOW、Appliance Developer Kit および s800i の IAX2 チャネルドライバ (chan_iax2) には、サービス運用妨害 (トラフィック増幅) 状態となる脆弱性が存在します。 本問題は、CVE-2008-1923 でも修正が不完全だったことによる脆弱性です。

Possible impacts 第三者により、3 方向ハンドシェイクを完了しない偽造された ACK レスポンスを介して、サービス運用妨害 (トラフィック増幅) 状態にされる可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date April 22, 2008, midnight
Registration Date June 26, 2012, 4:02 p.m.
Last Update June 26, 2012, 4:02 p.m.
CVSS2.0 : 警告
Score 4.3
Vector AV:N/AC:M/Au:N/C:N/I:N/A:P
Affected System
Digium
Asterisk Appliance Developer Kit 0.x.x
Asterisk Business Edition A.x.x、B.2.5.2 未満の B.x.x、および C.1.8.1 未満の C.x.x
Asterisk Open Source 1.0.x、1.2.28 未満の 1.2.x、および 1.4.19.1 未満の 1.4.x
AsteriskNOW 1.0.3 未満
s800i 1.1.0.3 未満
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
0 [2012年06月26日]
  掲載
Feb. 17, 2018, 10:37 a.m.

NVD Vulnerability Information
CVE-2008-1897
Summary

The IAX2 channel driver (chan_iax2) in Asterisk Open Source 1.0.x, 1.2.x before 1.2.28, and 1.4.x before 1.4.19.1; Business Edition A.x.x, B.x.x before B.2.5.2, and C.x.x before C.1.8.1; AsteriskNOW before 1.0.3; Appliance Developer Kit 0.x.x; and s800i before 1.1.0.3, when configured to allow unauthenticated calls, does not verify that an ACK response contains a call number matching the server's reply to a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed ACK response that does not complete a 3-way handshake. NOTE: this issue exists because of an incomplete fix for CVE-2008-1923.

Summary

El driver del canal IAX2 (chan_iax2) en Asterisk Open Source 1.0.x, 1.2.x anteriores a 1.2.28 y 1.4.x anteriores a 1.4.19.1; Business Edition A.x.x, B.x.x anteriores a B.2.5.2 y C.x.x anteriores a C.1.8.1; AsteriskNOW anteriores a 1.0.3; Apliance Developer Kit 0.x.x y s800i anterior a la 1.1.0.3, cuando está configurado para permitir llamadas no autenticadas, no verifica que una respuesta ACK contenga un número que coincida con el de respuesta del servidor a un NUEVO mensaje, que puede permitir a los atacantes provocar una denegación de servicio (amplificación del tráfico) a través de una respuesta ACK falseada, que no complete la negociación de 3 pasos. NOTA: Este problema existe debido a una correción incompleto para CVE-2008-1923

Publication Date April 24, 2008, 1:05 a.m.
Registration Date Jan. 29, 2021, 1:35 p.m.
Last Update April 23, 2026, 9:35 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.4:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.5:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.7:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.8:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:* b.2.5.1
cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:* c1.8.0
cpe:2.3:a:asterisk:asterisk_business_edition:a:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.6:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0:beta7:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0:beta8:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisknow:*:*:*:*:*:*:*:* 1.0.2
cpe:2.3:a:asterisk:asterisknow:1.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisknow:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:* 1.2.27
cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:* 1.4.19
cpe:2.3:a:asterisk:open_source:1.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.3.4:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.11:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.11:patch:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.11.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.11.1:patch:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.12:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.12:patch:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.0:beta1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.0:beta2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.2:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.3:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.4:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.5:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.6:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.7:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.7.1:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.8:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.8:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.9:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.9.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.9.1:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.10:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.11:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.12:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.12.1:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.13:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.14:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.14:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.15:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.16:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.17:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.18:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.19:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.20:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.21:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.21.1:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.22:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.23:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.24:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.25:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.26:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.26:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.26.1:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.26.2:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.0:beta2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.0:beta3:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.0:beta4:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.10:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.10.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.11:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.12:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.12.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.13:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.14:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.15:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.16:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.16.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.16.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.17:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.18:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.18.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:s800i:*:*:*:*:*:*:*:* 1.1.0.2
cpe:2.3:a:asterisk:s800i:1.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:s800i:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:s800i:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:s800i:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:s800i:1.0.3.3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:s800i:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:s800i:1.1.0.1:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List