The ooh323 channel driver in Asterisk Addons 1.2.x before 1.2.9 and Asterisk-Addons 1.4.x before 1.4.7 creates a remotely accessible TCP port that is intended solely for localhost communication, and interprets some TCP application-data fields as addresses of memory to free, which allows remote attackers to cause a denial of service (daemon crash) via crafted TCP packets.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T09:05:30.281Z
Reserved: 2008-06-03T00:00:00
Link: CVE-2008-2543

No data.

Status : Modified
Published: 2008-06-05T20:32:00.000
Modified: 2024-11-21T00:47:07.117
Link: CVE-2008-2543

No data.