CVE-2008-0095

Asterisk Appliance Developer Kit - Resource Management Error

Title source: rule
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2008-0095. PoCs published by greyvoip.

AI-analyzed exploit summary This exploit is a crafted SIP BYE message that triggers a denial-of-service (DoS) condition in Asterisk by causing the application to crash. The vulnerability is exploited by sending a malformed SIP packet with an 'Also' header, which the software fails to handle properly.

Description

The SIP channel driver in Asterisk Open Source 1.4.x before 1.4.17, Business Edition before C.1.0-beta8, AsteriskNOW before beta7, Appliance Developer Kit before Asterisk 1.4 revision 95946, and Appliance s800i 1.0.x before 1.0.3.4 allows remote attackers to cause a denial of service (daemon crash) via a BYE message with an Also (Also transfer) header, which triggers a NULL pointer dereference.

Exploits (1)

exploitdb WORKING POC
by greyvoip · textdosmultiple
https://www.exploit-db.com/exploits/30974

This exploit is a crafted SIP BYE message that triggers a denial-of-service (DoS) condition in Asterisk by causing the application to crash. The vulnerability is exploited by sending a malformed SIP packet with an 'Also' header, which the software fails to handle properly.

Classification
Working Poc 90%
Attack Type
Dos
Complexity
Trivial
Reliability
Reliable
Target: Asterisk (versions affected by CVE-2008-0095)
No auth needed
Prerequisites: Network access to the target Asterisk server · Ability to send SIP messages to the target
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (12)

Core 12
Core References
Exploit, Patch vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/27110
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2008/0019
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/485727/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/39361
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/3520
Patch, Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/28312
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id?1019152
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/28299

Scores

EPSS 0.2656
EPSS Percentile 96.4%

Details

CWE
CWE-399
Status published
Products (5)
asterisk/asterisk_appliance_developer_kit < 1.4_revision_95945
asterisk/asterisk_business_edition < c.1.0beta7
asterisk/asterisknow < beta_6
asterisk/open_source < 1.4.16
asterisk/s800i < 1.0.3.3
Published Jan 08, 2008
Tracked Since Feb 18, 2026