ID CVE-2007-1594
Summary The handle_response function in chan_sip.c in Asterisk before 1.2.17 and 1.4.x before 1.4.2 allows remote attackers to cause a denial of service (crash) via a SIP Response code 0 in a SIP packet.
References
Vulnerable Configurations
  • cpe:2.3:a:asterisk:asterisk:0.1.7
    cpe:2.3:a:asterisk:asterisk:0.1.7
  • cpe:2.3:a:asterisk:asterisk:0.1.8
    cpe:2.3:a:asterisk:asterisk:0.1.8
  • cpe:2.3:a:asterisk:asterisk:0.1.9
    cpe:2.3:a:asterisk:asterisk:0.1.9
  • cpe:2.3:a:asterisk:asterisk:0.1.9_1
    cpe:2.3:a:asterisk:asterisk:0.1.9_1
  • cpe:2.3:a:asterisk:asterisk:0.1.11
    cpe:2.3:a:asterisk:asterisk:0.1.11
  • cpe:2.3:a:asterisk:asterisk:0.2
    cpe:2.3:a:asterisk:asterisk:0.2
  • cpe:2.3:a:asterisk:asterisk:0.3
    cpe:2.3:a:asterisk:asterisk:0.3
  • cpe:2.3:a:asterisk:asterisk:0.4
    cpe:2.3:a:asterisk:asterisk:0.4
  • cpe:2.3:a:asterisk:asterisk:0.7.0
    cpe:2.3:a:asterisk:asterisk:0.7.0
  • cpe:2.3:a:asterisk:asterisk:0.7.1
    cpe:2.3:a:asterisk:asterisk:0.7.1
  • cpe:2.3:a:asterisk:asterisk:0.7.2
    cpe:2.3:a:asterisk:asterisk:0.7.2
  • cpe:2.3:a:asterisk:asterisk:0.9.0
    cpe:2.3:a:asterisk:asterisk:0.9.0
  • cpe:2.3:a:asterisk:asterisk:1.0
    cpe:2.3:a:asterisk:asterisk:1.0
  • cpe:2.3:a:asterisk:asterisk:1.0.6
    cpe:2.3:a:asterisk:asterisk:1.0.6
  • cpe:2.3:a:asterisk:asterisk:1.0.7
    cpe:2.3:a:asterisk:asterisk:1.0.7
  • cpe:2.3:a:asterisk:asterisk:1.0.8
    cpe:2.3:a:asterisk:asterisk:1.0.8
  • cpe:2.3:a:asterisk:asterisk:1.0.9
    cpe:2.3:a:asterisk:asterisk:1.0.9
  • cpe:2.3:a:asterisk:asterisk:1.0.10
    cpe:2.3:a:asterisk:asterisk:1.0.10
  • cpe:2.3:a:asterisk:asterisk:1.0.11
    cpe:2.3:a:asterisk:asterisk:1.0.11
  • cpe:2.3:a:asterisk:asterisk:1.0.12
    cpe:2.3:a:asterisk:asterisk:1.0.12
  • cpe:2.3:a:asterisk:asterisk:1.2.0_beta1
    cpe:2.3:a:asterisk:asterisk:1.2.0_beta1
  • cpe:2.3:a:asterisk:asterisk:1.2.0_beta2
    cpe:2.3:a:asterisk:asterisk:1.2.0_beta2
  • cpe:2.3:a:asterisk:asterisk:1.2.5
    cpe:2.3:a:asterisk:asterisk:1.2.5
  • cpe:2.3:a:asterisk:asterisk:1.2.6
    cpe:2.3:a:asterisk:asterisk:1.2.6
  • cpe:2.3:a:asterisk:asterisk:1.2.7
    cpe:2.3:a:asterisk:asterisk:1.2.7
  • cpe:2.3:a:asterisk:asterisk:1.2.8
    cpe:2.3:a:asterisk:asterisk:1.2.8
  • cpe:2.3:a:asterisk:asterisk:1.2.9
    cpe:2.3:a:asterisk:asterisk:1.2.9
  • cpe:2.3:a:asterisk:asterisk:1.2.10
    cpe:2.3:a:asterisk:asterisk:1.2.10
  • cpe:2.3:a:asterisk:asterisk:1.2.11
    cpe:2.3:a:asterisk:asterisk:1.2.11
  • cpe:2.3:a:asterisk:asterisk:1.2.12
    cpe:2.3:a:asterisk:asterisk:1.2.12
  • cpe:2.3:a:asterisk:asterisk:1.2.13
    cpe:2.3:a:asterisk:asterisk:1.2.13
  • cpe:2.3:a:asterisk:asterisk:1.2.14
    cpe:2.3:a:asterisk:asterisk:1.2.14
  • cpe:2.3:a:asterisk:asterisk:1.2.15
    cpe:2.3:a:asterisk:asterisk:1.2.15
  • cpe:2.3:a:asterisk:asterisk:1.2.16
    cpe:2.3:a:asterisk:asterisk:1.2.16
  • cpe:2.3:a:asterisk:asterisk:1.2.17
    cpe:2.3:a:asterisk:asterisk:1.2.17
  • cpe:2.3:a:asterisk:asterisk:1.4.1
    cpe:2.3:a:asterisk:asterisk:1.4.1
  • cpe:2.3:a:asterisk:asterisk:1.4_beta
    cpe:2.3:a:asterisk:asterisk:1.4_beta
CVSS
Base: 7.8 (as of 23-03-2007 - 11:41)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
nessus via4
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-200704-01.NASL
    description The remote host is affected by the vulnerability described in GLSA-200704-01 (Asterisk: Two SIP Denial of Service vulnerabilities) The Madynes research team at INRIA has discovered that Asterisk contains a NULL pointer dereferencing error in the SIP channel when handling INVITE messages. Furthermore qwerty1979 discovered that Asterisk 1.2.x fails to properly handle SIP responses with return code 0. Impact : A remote attacker could cause an Asterisk server listening for SIP messages to crash by sending a specially crafted SIP message or answering with a 0 return code. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-11
    plugin id 24934
    published 2007-04-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=24934
    title GLSA-200704-01 : Asterisk: Two SIP Denial of Service vulnerabilities
  • NASL family SuSE Local Security Checks
    NASL id SUSE_ASTERISK-3543.NASL
    description This update fixes multiple bugs that allowed attackers to remotely crash asterisk or cause an information leak (CVE-2007-1561, CVE-2007-1594, CVE-2007-1595, CVE-2007-2297, CVE-2007-2488).
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 27157
    published 2007-10-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=27157
    title openSUSE 10 Security Update : asterisk (asterisk-3543)
refmap via4
bid 23093
bugtraq 20070321 Two new DoS Vulnerabilities in Asterisk Fixed
confirm
gentoo GLSA-200704-01
misc
mlist [VOIPSEC] 20070319 Asterisk SDP DOS vulnerability
sectrack 1017809
secunia
  • 24579
  • 24719
  • 25582
suse SUSE-SA:2007:034
vupen ADV-2007-1077
Last major update 07-03-2011 - 21:52
Published 22-03-2007 - 19:19
Last modified 16-10-2018 - 12:39
Back to Top