Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2007-2293 — Improper Restriction of Operations within the Bounds of a Memory Buffer in Asterisk
6 documents5 sources
Severity
7.6HIGHNVD
EPSS
49.6%
top 2.19%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedApr 26
Latest updateMay 1
Description
Multiple stack-based buffer overflows in the process_sdp function in chan_sip.c of the SIP channel T.38 SDP parser in Asterisk before 1.4.3 allow remote attackers to execute arbitrary code via a long (1) T38FaxRateManagement or (2) T38FaxUdpEC SDP parameter in an SIP message, as demonstrated using SIP INVITE.
CVSS vector
AV:N/AC:H/C:C/I:C/A:CExploitability: 4.9 | Impact: 10.0
Affected Packages3 packages
Patches
🔴Vulnerability Details
2💥Exploits & PoCs
2📋Vendor Advisories
1Debian▶
CVE-2007-2293: asterisk - Multiple stack-based buffer overflows in the process_sdp function in chan_sip.c ...↗2007