7.8
CVSSv2

CVE-2007-1594

Published: 22/03/2007 Updated: 16/10/2018
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The handle_response function in chan_sip.c in Asterisk prior to 1.2.17 and 1.4.x prior to 1.4.2 allows remote malicious users to cause a denial of service (crash) via a SIP Response code 0 in a SIP packet.

Vulnerable Product Search on Vulmon Subscribe to Product

asterisk asterisk 0.1.9_1

asterisk asterisk 0.2

asterisk asterisk 1.0

asterisk asterisk 1.0.10

asterisk asterisk 1.2.0_beta2

asterisk asterisk 1.2.10

asterisk asterisk 1.2.17

asterisk asterisk 1.2.5

asterisk asterisk 0.1.11

asterisk asterisk 0.1.7

asterisk asterisk 0.7.0

asterisk asterisk 0.7.1

asterisk asterisk 1.0.6

asterisk asterisk 1.0.7

asterisk asterisk 1.2.13

asterisk asterisk 1.2.14

asterisk asterisk 1.2.8

asterisk asterisk 1.2.9

asterisk asterisk 0.3

asterisk asterisk 0.4

asterisk asterisk 1.0.11

asterisk asterisk 1.0.12

asterisk asterisk 1.2.11

asterisk asterisk 1.2.12

asterisk asterisk 1.2.6

asterisk asterisk 1.2.7

asterisk asterisk 0.1.8

asterisk asterisk 0.1.9

asterisk asterisk 0.7.2

asterisk asterisk 0.9.0

asterisk asterisk 1.0.8

asterisk asterisk 1.0.9

asterisk asterisk 1.2.0_beta1

asterisk asterisk 1.2.15

asterisk asterisk 1.2.16

asterisk asterisk 1.4.1

asterisk asterisk 1.4_beta

Vendor Advisories

Debian Bug report logs - #419820 CVE-2007-1594: Asterisk segfaults upon receipt of a certain SIP packet (SIP Response code 0) Package: asterisk; Maintainer for asterisk is Debian VoIP Team <pkg-voip-maintainers@listsaliothdebianorg>; Source for asterisk is src:asterisk (PTS, buildd, popcon) Reported by: Frédéric Brière ...