{ "schema_version": "1.4.0", "id": "GHSA-hxw2-63x7-78fq", "modified": "2022-05-01T23:50:55Z", "published": "2022-05-01T23:50:55Z", "aliases": [ "CVE-2008-2543" ], "details": "The ooh323 channel driver in Asterisk Addons 1.2.x before 1.2.9 and Asterisk-Addons 1.4.x before 1.4.7 creates a remotely accessible TCP port that is intended solely for localhost communication, and interprets some TCP application-data fields as addresses of memory to free, which allows remote attackers to cause a denial of service (daemon crash) via crafted TCP packets.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2543" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42869" }, { "type": "WEB", "url": "http://downloads.digium.com/pub/security/AST-2008-009.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/30555" }, { "type": "WEB", "url": "http://securitytracker.com/id?1020202" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/493122/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/493144/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/29567" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/1747/references" } ], "database_specific": { "cwe_ids": [], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2008-06-05T20:32:00Z" } }