Max CVSS | 10.0 | Min CVSS | 7.5 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2007-2297 | 7.8 |
The SIP channel driver (chan_sip) in Asterisk before 1.2.18 and 1.4.x before 1.4.3 does not properly parse SIP UDP packets that do not contain a valid response code, which allows remote attackers to cause a denial of service (crash).
|
16-10-2018 - 16:43 | 26-04-2007 - 20:19 | |
CVE-2007-2294 | 7.8 |
The Manager Interface in Asterisk before 1.2.18 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (crash) by using MD5 authentication to authenticate a user that does not have a password defined in manager.conf, resulting in
|
16-10-2018 - 16:43 | 26-04-2007 - 20:19 | |
CVE-2007-1561 | 7.8 |
The channel driver in Asterisk before 1.2.17 and 1.4.x before 1.4.2 allows remote attackers to cause a denial of service (crash) via a SIP INVITE message with an SDP containing one valid and one invalid IP address.
|
16-10-2018 - 16:39 | 21-03-2007 - 19:19 | |
CVE-2007-1594 | 7.8 |
The handle_response function in chan_sip.c in Asterisk before 1.2.17 and 1.4.x before 1.4.2 allows remote attackers to cause a denial of service (crash) via a SIP Response code 0 in a SIP packet.
|
16-10-2018 - 16:39 | 22-03-2007 - 23:19 | |
CVE-2007-2488 | 10.0 |
The IAX2 channel driver (chan_iax2) in Asterisk before 20070504 does not properly null terminate data, which allows remote attackers to trigger loss of transmitted data, and possibly obtain sensitive information (memory contents) or cause a denial of
|
29-07-2017 - 01:31 | 07-05-2007 - 19:19 | |
CVE-2007-1306 | 7.8 |
Asterisk 1.4 before 1.4.1 and 1.2 before 1.2.16 allows remote attackers to cause a denial of service (crash) by sending a Session Initiation Protocol (SIP) packet without a URI and SIP-version header, which results in a NULL pointer dereference. Per:
|
29-07-2017 - 01:30 | 07-03-2007 - 00:19 | |
CVE-2007-1595 | 7.5 |
The Asterisk Extension Language (AEL) in pbx/pbx_ael.c in Asterisk does not properly generate extensions, which allows remote attackers to execute arbitrary extensions and have an unknown impact by specifying an invalid extension in a certain form.
|
08-03-2011 - 02:52 | 22-03-2007 - 23:19 |