7.8
CVSSv2

CVE-2007-2294

Published: 26/04/2007 Updated: 16/10/2018
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The Manager Interface in Asterisk prior to 1.2.18 and 1.4.x prior to 1.4.3 allows remote malicious users to cause a denial of service (crash) by using MD5 authentication to authenticate a user that does not have a password defined in manager.conf, resulting in a NULL pointer dereference.

Vulnerable Product Search on Vulmon Subscribe to Product

asterisk asterisk 1.2.11

asterisk asterisk 1.2.12

asterisk asterisk 1.2.6

asterisk asterisk 1.2.7

asterisk asterisk 1.2.8

asterisk asterisk 1.2.0_beta2

asterisk asterisk 1.2.10

asterisk asterisk 1.2.17

asterisk asterisk 1.2.5

asterisk asterisk 1.2.13

asterisk asterisk 1.2.14

asterisk asterisk 1.2.9

asterisk asterisk 1.4.1

asterisk asterisk 1.2.0_beta1

asterisk asterisk 1.2.15

asterisk asterisk 1.2.16

asterisk asterisk 1.4.2

asterisk asterisk 1.4_beta

Vendor Advisories

Debian Bug report logs - #419820 CVE-2007-1594: Asterisk segfaults upon receipt of a certain SIP packet (SIP Response code 0) Package: asterisk; Maintainer for asterisk is Debian VoIP Team <pkg-voip-maintainers@listsaliothdebianorg>; Source for asterisk is src:asterisk (PTS, buildd, popcon) Reported by: Frédéric Brière ...
Several remote vulnerabilities have been discovered in Asterisk, a free software PBX and telephony toolkit The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-1306 Mu Security discovered that a NULL pointer dereference in the SIP implementation could lead to denial of service CVE-2007-1561 Inr ...