7.8
CVSSv2

CVE-2007-1594

Published: 22/03/2007 Updated: 16/10/2018
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The handle_response function in chan_sip.c in Asterisk prior to 1.2.17 and 1.4.x prior to 1.4.2 allows remote malicious users to cause a denial of service (crash) via a SIP Response code 0 in a SIP packet.

Vulnerable Product Search on Vulmon Subscribe to Product

asterisk asterisk 0.1.11

asterisk asterisk 0.1.7

asterisk asterisk 1.0.11

asterisk asterisk 1.2.14

asterisk asterisk 1.2.16

asterisk asterisk 0.3

asterisk asterisk 0.7.2

asterisk asterisk 1.2.5

asterisk asterisk 0.1.9 1

asterisk asterisk 0.1.8

asterisk asterisk 1.0.8

asterisk asterisk 1.4 beta

asterisk asterisk 1.2.6

asterisk asterisk 1.2.7

asterisk asterisk 1.2.0 beta1

asterisk asterisk 0.9.0

asterisk asterisk 1.0.12

asterisk asterisk 1.2.8

asterisk asterisk 0.7.1

asterisk asterisk 1.2.15

asterisk asterisk 0.4

asterisk asterisk 1.2.17

asterisk asterisk 1.2.11

asterisk asterisk 1.2.12

asterisk asterisk 1.0.6

asterisk asterisk 0.1.9

asterisk asterisk 1.0.9

asterisk asterisk 1.2.10

asterisk asterisk 1.2.9

asterisk asterisk 1.0.7

asterisk asterisk 1.2.13

asterisk asterisk 1.2.0 beta2

asterisk asterisk 1.0

asterisk asterisk 0.7.0

asterisk asterisk 1.4.1

asterisk asterisk 1.0.10

asterisk asterisk 0.2

Vendor Advisories

Debian Bug report logs - #419820 CVE-2007-1594: Asterisk segfaults upon receipt of a certain SIP packet (SIP Response code 0) Package: asterisk; Maintainer for asterisk is Debian VoIP Team <pkg-voip-maintainers@listsaliothdebianorg>; Source for asterisk is src:asterisk (PTS, buildd, popcon) Reported by: Frédéric Brière ...