Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2007-3763Asterisk vulnerability

5 documents5 sources
Severity
5.0MEDIUMNVD
EPSS
25.2%
top 3.80%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJul 18
Latest updateMay 1

Description

The IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted (1) LAGRQ or (2) LAGRP frame that contains information elements of IAX frames, which results in a NULL pointer dereference when Asterisk does not properly set an associated variable.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages6 packages

NVDasterisk/s800i_appliance1.0, 1.0.1+1
NVDasterisk/asterisknowbeta_5, beta_6+1
debiandebian/asterisk< asterisk 1:1.4.8~dfsg-1 (bullseye)
Debianasterisk/asterisk< 1:1.4.8~dfsg-1

Patches

🔴Vulnerability Details

2
GHSA
GHSA-822c-3x4j-h56q: The IAX2 channel driver (chan_iax2) in Asterisk before 12022-05-01
OSV
CVE-2007-3763: The IAX2 channel driver (chan_iax2) in Asterisk before 12007-07-18

💥Exploits & PoCs

1
Exploit-DB
Asterisk < 1.2.22/1.4.8 - IAX2 Channel Driver Remote Crash2007-07-31

📋Vendor Advisories

1
Debian
CVE-2007-3763: asterisk - The IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1...2007
CVE-2007-3763 — Debian Asterisk vulnerability | cvebase