ID CVE-2007-2293
Summary Multiple stack-based buffer overflows in the process_sdp function in chan_sip.c of the SIP channel T.38 SDP parser in Asterisk before 1.4.3 allow remote attackers to execute arbitrary code via a long (1) T38FaxRateManagement or (2) T38FaxUdpEC SDP parameter in an SIP message, as demonstrated using SIP INVITE.
References
Vulnerable Configurations
  • cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*
CVSS
Base: 7.6 (as of 16-10-2018 - 16:43)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:H/Au:N/C:C/I:C/A:C
refmap via4
bid 23648
bugtraq
  • 20070425 ASA-2007-010: Two stack buffer overflows in SIP channel's T.38 SDP parsing code
  • 20070704 Multiple Remote unauthenticated stack overflows in Asterisk chan_sip.c
confirm http://www.asterisk.org/files/ASA-2007-010.pdf
osvdb 35368
sectrack
  • 1017951
  • 1018337
secunia 24977
sreason 2645
vupen ADV-2007-1534
xf asterisk-processsdp-bo(33895)
Last major update 16-10-2018 - 16:43
Published 26-04-2007 - 20:19
Last modified 16-10-2018 - 16:43
Back to Top