CVE-2007-3762Improper Restriction of Operations within the Bounds of a Memory Buffer in Asterisk

4 documents4 sources
Severity
9.3CRITICALNVD
EPSS
10.2%
top 6.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 18
Latest updateMay 1

Description

Stack-based buffer overflow in the IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to execute arbitrary code by sending a long (1) voice or (2) video RTP frame.

CVSS vector

AV:N/AC:M/C:C/I:C/A:CExploitability: 8.6 | Impact: 10.0

Affected Packages6 packages

NVDasterisk/s800i_appliance1.0, 1.0.1+1
NVDasterisk/asterisknowbeta_5, beta_6+1
debiandebian/asterisk< asterisk 1:1.4.8~dfsg-1 (bullseye)
Debianasterisk/asterisk< 1:1.4.8~dfsg-1

Patches

🔴Vulnerability Details

2
GHSA
GHSA-cwmp-cc64-x5pj: Stack-based buffer overflow in the IAX2 channel driver (chan_iax2) in Asterisk before 12022-05-01
OSV
CVE-2007-3762: Stack-based buffer overflow in the IAX2 channel driver (chan_iax2) in Asterisk before 12007-07-18

📋Vendor Advisories

1
Debian
CVE-2007-3762: asterisk - Stack-based buffer overflow in the IAX2 channel driver (chan_iax2) in Asterisk b...2007
CVE-2007-3762 — Debian Asterisk vulnerability | cvebase