First published: Thu Aug 09 2007(Updated: )
The Skinny channel driver (chan_skinny) in Asterisk Open Source before 1.4.10, AsteriskNOW before beta7, Appliance Developer Kit before 0.7.0, and Appliance s800i before 1.0.3 allows remote authenticated users to cause a denial of service (application crash) via a CAPABILITIES_RES_MESSAGE packet with a capabilities count larger than the capabilities_res_message array population.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Digium S800i | <=1.0.2 | |
Asterisk | <=1.4.9 | |
Digium Asterisk Appliance Developer Kit | <=0.6.0 | |
Digium AsteriskNOW | <=beta_6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4280 has a severity rating that indicates it can cause a denial of service through application crashes.
To fix CVE-2007-4280, upgrade to Asterisk version 1.4.10 or higher, or the corresponding secure versions of affected software.
CVE-2007-4280 affects Asterisk versions prior to 1.4.10, AsteriskNOW beta versions before beta7, and specific versions of the Appliance Developer Kit and s800i.
CVE-2007-4280 is caused by the processing of a CAPABILITIES_RES_MESSAGE packet by the Skinny channel driver in vulnerable Asterisk versions.
Yes, CVE-2007-4280 requires remote authenticated user access to exploit the denial of service vulnerability.