7.6
CVSSv2

CVE-2007-2293

Published: 26/04/2007 Updated: 16/10/2018
CVSS v2 Base Score: 7.6 | Impact Score: 10 | Exploitability Score: 4.9
VMScore: 770
Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple stack-based buffer overflows in the process_sdp function in chan_sip.c of the SIP channel T.38 SDP parser in Asterisk prior to 1.4.3 allow remote malicious users to execute arbitrary code via a long (1) T38FaxRateManagement or (2) T38FaxUdpEC SDP parameter in an SIP message, as demonstrated using SIP INVITE.

Vulnerable Product Search on Vulmon Subscribe to Product

asterisk asterisk 1.4.1

asterisk asterisk 1.4.2

asterisk asterisk 1.4_beta

Exploits

source: wwwsecurityfocuscom/bid/23648/info Asterisk is prone to multiple remote stack-based buffer-overflow vulnerabilities because it fails to perform adequate boundary checks on user-supplied data before copying it to insufficiently sized buffers Successful exploits may allow an attacker to execute arbitrary machine code to compromi ...
source: wwwsecurityfocuscom/bid/23648/info Asterisk is prone to multiple remote stack-based buffer-overflow vulnerabilities because it fails to perform adequate boundary checks on user-supplied data before copying it to insufficiently sized buffers Successful exploits may allow an attacker to execute arbitrary machine code to compromise ...