Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
The IAX2 channel driver (chan_iax2) in Asterisk Open Source 1.0.x, 1.2.x before 1.2.28, and 1.4.x before 1.4.19.1; Business Edition A.x.x, B.x.x before B.2.5.2, and C.x.x before C.1.8.1; AsteriskNOW before 1.0.3; Appliance Developer Kit 0.x.x; and s800i before 1.1.0.3, when configured to allow unauthenticated calls, does not verify that an ACK response contains a call number matching the server's reply to a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed ACK response that does not complete a 3-way handshake. NOTE: this issue exists because of an incomplete fix for CVE-2008-1923.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Asterisk IAX2报文放大远程拒绝服务漏洞
Vulnerability Description
Asterisk是开放源码的软件PBX,支持各种VoIP协议和设备。 Asterisk在处理呼叫的机制上存在漏洞,远程攻击者可能利用此漏洞对第三方机器执行拒绝服务攻击。 IAX2协议允许IC_NEW报文启动呼叫。IC_NEW报文是18字节长的UDP报文,而呼叫可能非常长,包含有很多数据。由于UDP是可以伪造的,远程攻击者可以在IAX2握手期间欺骗IAX2握手,导致Asterisk服务器向目标发送大量数据,造成网络堵塞。
CVSS Information
N/A
Vulnerability Type
N/A