First published: Mon Mar 24 2008(Updated: )
The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asterisk | =1.4.1 | |
Asterisk | =1.4.2 | |
Asterisk | =1.4.3 | |
Asterisk | =1.4.4 | |
Asterisk | =1.4.5 | |
Asterisk | =1.4.6 | |
Asterisk | =1.4.7 | |
Asterisk | =1.4.8 | |
Asterisk | =1.4.9 | |
Asterisk | =1.4.10 | |
Asterisk | =1.4.11 | |
Asterisk | =1.4.12 | |
Asterisk | =1.4.13 | |
Asterisk | =1.4.14 | |
Asterisk | =1.4.15 | |
Asterisk | =1.4.16 | |
Asterisk | =1.4.17 | |
Asterisk | =1.4.18.1 | |
Asterisk | =1.4_beta | |
Asterisk | =1.4_revision_95946 | |
Asterisk | =1.6 | |
Digium Asterisk Appliance Developer Kit | =0.2 | |
Digium Asterisk Appliance Developer Kit | =0.3 | |
Digium Asterisk Appliance Developer Kit | =0.4 | |
Digium Asterisk Appliance Developer Kit | =0.5 | |
Digium Asterisk Appliance Developer Kit | =0.6 | |
Digium Asterisk Appliance Developer Kit | =0.7 | |
Digium Asterisk Appliance Developer Kit | =0.8 | |
Digium Asterisk Appliance Developer Kit | =1.4 | |
Asterisk Business Edition | =c.1.0-beta7 | |
Asterisk Business Edition | =c.1.0-beta8 | |
Digium AsteriskNOW | =1.0 | |
Digium AsteriskNOW | =beta_5 | |
Digium AsteriskNOW | =beta_6 | |
Digium AsteriskNOW | =beta_7 | |
Digium Asterisk s800i Appliance | =1.0 | |
Digium Asterisk s800i Appliance | =1.0.1 | |
Digium Asterisk s800i Appliance | =1.0.2 | |
Digium Asterisk s800i Appliance | =1.0.3 | |
Digium Asterisk s800i Appliance | =1.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1390 has a medium severity rating due to its impact on authentication security.
To fix CVE-2008-1390, upgrade Asterisk to version 1.4.19-rc3 or later for 1.4.x and 1.6.0-beta6 or later for 1.6.x.
CVE-2008-1390 affects Asterisk versions from 1.4.1 to 1.4.18.1, and 1.6.x beta versions prior to 1.6.0-beta6.
CVE-2008-1390 involves the generation of insufficiently random manager ID values in the AsteriskGUI HTTP server.
Yes, CVE-2008-1390 can potentially be exploited remotely due to its nature as a web-based vulnerability.