First published: Thu Apr 26 2007(Updated: )
The SIP channel driver (chan_sip) in Asterisk before 1.2.18 and 1.4.x before 1.4.3 does not properly parse SIP UDP packets that do not contain a valid response code, which allows remote attackers to cause a denial of service (crash).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asterisk | =1.2.0_beta1 | |
Asterisk | =1.2.0_beta2 | |
Asterisk | =1.2.10 | |
Asterisk | =1.2.11 | |
Asterisk | =1.2.12 | |
Asterisk | =1.2.13 | |
Asterisk | =1.2.14 | |
Asterisk | =1.2.15 | |
Asterisk | =1.2.16 | |
Asterisk | =1.2.17 | |
Asterisk | =1.4.1 | |
Asterisk | =1.4.2 | |
Asterisk | =1.4_beta |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2297 has a high severity rating as it allows remote attackers to cause a denial of service by crashing affected systems.
To fix CVE-2007-2297, upgrade Asterisk to version 1.2.18 or later or 1.4.3 or later.
CVE-2007-2297 affects Asterisk versions 1.2.0_beta1 through 1.2.17 and 1.4.1 through 1.4.2.
CVE-2007-2297 is classified as a denial of service vulnerability affecting the SIP channel driver in Asterisk.
Yes, CVE-2007-2297 can be exploited remotely through malformed SIP UDP packets.