7.8
CVSSv2

CVE-2007-2297

Published: 26/04/2007 Updated: 16/10/2018
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The SIP channel driver (chan_sip) in Asterisk prior to 1.2.18 and 1.4.x prior to 1.4.3 does not properly parse SIP UDP packets that do not contain a valid response code, which allows remote malicious users to cause a denial of service (crash).

Vulnerable Product Search on Vulmon Subscribe to Product

asterisk asterisk 1.2.0_beta2

asterisk asterisk 1.2.10

asterisk asterisk 1.2.17

asterisk asterisk 1.4.1

asterisk asterisk 1.2.0_beta1

asterisk asterisk 1.2.15

asterisk asterisk 1.2.16

asterisk asterisk 1.2.11

asterisk asterisk 1.2.12

asterisk asterisk 1.4.2

asterisk asterisk 1.4_beta

asterisk asterisk 1.2.13

asterisk asterisk 1.2.14

Vendor Advisories

Debian Bug report logs - #419820 CVE-2007-1594: Asterisk segfaults upon receipt of a certain SIP packet (SIP Response code 0) Package: asterisk; Maintainer for asterisk is Debian VoIP Team <pkg-voip-maintainers@listsaliothdebianorg>; Source for asterisk is src:asterisk (PTS, buildd, popcon) Reported by: Frédéric Brière ...
Several remote vulnerabilities have been discovered in Asterisk, a free software PBX and telephony toolkit The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-1306 Mu Security discovered that a NULL pointer dereference in the SIP implementation could lead to denial of service CVE-2007-1561 Inr ...