Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2007-3764Asterisk vulnerability

5 documents5 sources
Severity
5.0MEDIUMNVD
EPSS
45.6%
top 2.37%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJul 18
Latest updateMay 1

Description

The Skinny channel driver (chan_skinny) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a certain data length value in a crafted packet, which results in an "overly large memcpy."

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages6 packages

NVDasterisk/s800i_appliance1.0, 1.0.1+1
NVDasterisk/asterisknowbeta_5, beta_6+1
debiandebian/asterisk< asterisk 1:1.4.8~dfsg-1 (bullseye)
Debianasterisk/asterisk< 1:1.4.8~dfsg-1

Patches

🔴Vulnerability Details

2
GHSA
GHSA-c8c6-m3x8-7cq5: The Skinny channel driver (chan_skinny) in Asterisk before 12022-05-01
OSV
CVE-2007-3764: The Skinny channel driver (chan_skinny) in Asterisk before 12007-07-18

💥Exploits & PoCs

1
Exploit-DB
Asterisk < 1.2.22/1.4.8/2.2.1 - 'chan_skinny' Remote Denial of Service2007-07-18

📋Vendor Advisories

1
Debian
CVE-2007-3764: asterisk - The Skinny channel driver (chan_skinny) in Asterisk before 1.2.22 and 1.4.x befo...2007
CVE-2007-3764 — Debian Asterisk vulnerability | cvebase