A denial of service vulnerability in Asterisk Open Source versions 1.0.x, 1.2.x, and 1.4.x allows remote attackers to cause traffic amplification via spoofed ACK response
Reporter | Title | Published | Views | Family All 34 |
---|---|---|---|---|
![]() | CVE-2008-1897 | 23 Apr 200816:05 | β | nvd |
![]() | CVE-2008-1923 | 23 Apr 200816:05 | β | nvd |
![]() | CVE-2008-1897 | 23 Apr 200800:00 | β | cvelist |
![]() | CVE-2008-1923 | 23 Apr 200816:00 | β | cvelist |
![]() | Code injection | 23 Apr 200816:05 | β | prion |
![]() | Code injection | 23 Apr 200816:05 | β | prion |
![]() | CVE-2008-1897 | 23 Apr 200816:05 | β | cve |
![]() | CVE-2008-1923 | 23 Apr 200816:05 | β | cve |
![]() | Asterisk IAX2 Multiple Method Handshake Spoofing DoS | 6 May 200800:00 | β | nessus |
![]() | Debian DSA-1563-1 : asterisk - programming error | 2 May 200800:00 | β | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 11 | all | asterisk | 1:1.4.19.1~dfsg-1 | asterisk_1:1.4.19.1~dfsg-1_all.deb |
Debian | 999 | all | asterisk | 1:1.4.19.1~dfsg-1 | asterisk_1:1.4.19.1~dfsg-1_all.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo