CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
92.0%
The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses.
Vendor | Product | Version | CPE |
---|---|---|---|
asterisk | asterisk | 1.4.1 | cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:* |
asterisk | asterisk | 1.4.2 | cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:* |
asterisk | asterisk | 1.4.3 | cpe:2.3:a:asterisk:asterisk:1.4.3:*:*:*:*:*:*:* |
asterisk | asterisk | 1.4.4 | cpe:2.3:a:asterisk:asterisk:1.4.4:*:*:*:*:*:*:* |
asterisk | asterisk | 1.4.5 | cpe:2.3:a:asterisk:asterisk:1.4.5:*:*:*:*:*:*:* |
asterisk | asterisk | 1.4.6 | cpe:2.3:a:asterisk:asterisk:1.4.6:*:*:*:*:*:*:* |
asterisk | asterisk | 1.4.7 | cpe:2.3:a:asterisk:asterisk:1.4.7:*:*:*:*:*:*:* |
asterisk | asterisk | 1.4.8 | cpe:2.3:a:asterisk:asterisk:1.4.8:*:*:*:*:*:*:* |
asterisk | asterisk | 1.4.9 | cpe:2.3:a:asterisk:asterisk:1.4.9:*:*:*:*:*:*:* |
asterisk | asterisk | 1.4.10 | cpe:2.3:a:asterisk:asterisk:1.4.10:*:*:*:*:*:*:* |
downloads.digium.com/pub/security/AST-2008-005.html
secunia.com/advisories/29449
secunia.com/advisories/29470
securityreason.com/securityalert/3764
www.securityfocus.com/archive/1/489819/100/0/threaded
www.securityfocus.com/bid/28316
www.securitytracker.com/id?1019679
exchange.xforce.ibmcloud.com/vulnerabilities/41304
www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html
www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html