fkie_cve-2007-1306
Vulnerability from fkie_nvd
Published
2007-03-07 00:19
Modified
2024-11-21 00:28
Severity ?
Summary
Asterisk 1.4 before 1.4.1 and 1.2 before 1.2.16 allows remote attackers to cause a denial of service (crash) by sending a Session Initiation Protocol (SIP) packet without a URI and SIP-version header, which results in a NULL pointer dereference.
References
cve@mitre.orghttp://asterisk.org/node/48319
cve@mitre.orghttp://asterisk.org/node/48320
cve@mitre.orghttp://labs.musecurity.com/advisories/MU-200703-01.txt
cve@mitre.orghttp://secunia.com/advisories/24380
cve@mitre.orghttp://secunia.com/advisories/24578Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/25582Vendor Advisory
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200703-14.xml
cve@mitre.orghttp://www.debian.org/security/2007/dsa-1358
cve@mitre.orghttp://www.kb.cert.org/vuls/id/228032US Government Resource
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_34_asterisk.html
cve@mitre.orghttp://www.osvdb.org/33888
cve@mitre.orghttp://www.securityfocus.com/bid/22838
cve@mitre.orghttp://www.securitytracker.com/id?1017723
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/0830Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/32830
af854a3a-2127-422b-91ae-364da2661108http://asterisk.org/node/48319
af854a3a-2127-422b-91ae-364da2661108http://asterisk.org/node/48320
af854a3a-2127-422b-91ae-364da2661108http://labs.musecurity.com/advisories/MU-200703-01.txt
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24380
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24578Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25582Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200703-14.xml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1358
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/228032US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_34_asterisk.html
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/33888
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/22838
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1017723
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/0830Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/32830
Impacted products
Vendor Product Version
digium asterisk 1.2.0_beta1
digium asterisk 1.2.0_beta2
digium asterisk 1.2.6
digium asterisk 1.2.7
digium asterisk 1.2.8
digium asterisk 1.2.9
digium asterisk 1.2.10
digium asterisk 1.2.11
digium asterisk 1.2.12
digium asterisk 1.2.12.1
digium asterisk 1.2.13
digium asterisk 1.2.14
digium asterisk 1.2.15
digium asterisk 1.2_beta1
digium asterisk 1.2_beta2
digium asterisk 1.4.0
digium asterisk 1.4.0_beta1
digium asterisk 1.4.0_beta2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.0_beta1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4042CC21-F3CB-4C77-9E60-AF8AA9A191C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.0_beta2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C656168D-7D6A-4E84-9196-A8B170E1F7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C619138A-557F-419E-9832-D0FB0E9042C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6656EA0-4D4F-4251-A30F-48375C5CE3E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AAD9104-BA4A-478F-9B56-195E0F9A7DF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F06C361-D7DF-474B-A835-BA8886C11A80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "175954A5-E712-41B8-BC11-4F999343063D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DF9E41E-8FE6-4396-A5D4-D4568600FE03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "4457486F-E9B4-46B8-A05D-3B32F8B639A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "69417F54-D92F-46FB-9BFA-995211279C0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "4611BEA0-25EC-4705-A390-6DF678373FF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "53022458-F443-4402-AC52-FC3AE810E89E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "120B85AA-E9B8-4A4D-81CE-FD36CDB63074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2_beta1:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FAB63F-B9F8-4D39-AEE9-BC0E54BAA944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2_beta2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BC20315-40B5-4DA1-AC49-E911C03AEA6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E56DB29-571D-4615-B347-38CF4590E463",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.0_beta1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B909947-44E3-463E-9FAD-76C8E21A54E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.0_beta2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FB2F8AA-B70B-4280-BDBD-023037C16D70",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Asterisk 1.4 before 1.4.1 and 1.2 before 1.2.16 allows remote attackers to cause a denial of service (crash) by sending a Session Initiation Protocol (SIP) packet without a URI and SIP-version header, which results in a NULL pointer dereference."
    },
    {
      "lang": "es",
      "value": "Asterisk versiones 1.4 anteriores a 1.4.1 y versiones 1.2 anteriores a 1.2.16, permite a atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo) enviando un paquete de Session Initiation Protocol (SIP) sin una URI y Encabezado SIP-version, lo que resulta en una desreferencia del puntero NULL."
    }
  ],
  "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html \r\n\u0027CWE-476: NULL Pointer Dereference\u0027",
  "id": "CVE-2007-1306",
  "lastModified": "2024-11-21T00:28:00.450",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-03-07T00:19:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://asterisk.org/node/48319"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://asterisk.org/node/48320"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://labs.musecurity.com/advisories/MU-200703-01.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/24380"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24578"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25582"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200703-14.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2007/dsa-1358"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/228032"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/33888"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/22838"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1017723"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/0830"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32830"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://asterisk.org/node/48319"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://asterisk.org/node/48320"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://labs.musecurity.com/advisories/MU-200703-01.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24380"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24578"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25582"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200703-14.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1358"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/228032"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/33888"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/22838"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1017723"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/0830"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32830"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.