First published: Wed Jul 18 2007(Updated: )
Stack-based buffer overflow in the IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to execute arbitrary code by sending a long (1) voice or (2) video RTP frame.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asterisk | =1.0.11 | |
Asterisk | =1.2.14 | |
Asterisk | =1.2.16 | |
Asterisk | =1.2.5 | |
Asterisk | =b.1.3.3 | |
Digium AsteriskNOW | =beta_6 | |
Asterisk | =1.0.8 | |
Digium AsteriskNOW | =beta_5 | |
Asterisk | =1.4_beta | |
Asterisk | =1.2.6 | |
Asterisk | =1.2.7 | |
Asterisk | =1.2.0_beta1 | |
Asterisk | =1.0.12 | |
Asterisk | =b.2.2.0 | |
Asterisk | =1.2.8 | |
Asterisk | =1.4.2 | |
Asterisk | =1.2.15 | |
Digium Asterisk Appliance Developer Kit | <=0.4 | |
Asterisk | =1.2.17 | |
Asterisk | =1.2.11 | |
Asterisk | =1.2.12 | |
Asterisk | =1.0.6 | |
Asterisk | =1.0.9 | |
Asterisk | =b.1.3.2 | |
Asterisk | =1.2.10 | |
Asterisk | =1.2.9 | |
Asterisk | =1.0.7 | |
Asterisk | =1.2.13 | |
Asterisk | =1.2.0_beta2 | |
Asterisk | =1.0 | |
Asterisk | =1.4.1 | |
Asterisk | =1.4.4_2007-04-27 | |
Asterisk | =1.0.10 | |
Asterisk | =a | |
Digium Asterisk s800i Appliance | =1.0 | |
Digium Asterisk s800i Appliance | =1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3762 is classified as a critical vulnerability due to its potential to allow remote attackers to execute arbitrary code.
To mitigate CVE-2007-3762, you should upgrade to Asterisk version 1.2.22, 1.4.8, Business Edition B.2.2.1, or later.
CVE-2007-3762 affects Asterisk versions prior to 1.2.22 and 1.4.x before 1.4.8.
Yes, CVE-2007-3762 allows remote attackers to exploit the vulnerability via specially crafted messages.
CVE-2007-3762 involves a stack-based buffer overflow in the IAX2 channel driver (chan_iax2) of Asterisk.