Vulnerability Name: CVE-2007-3763 (CCN-35465) Assigned: 2007-07-17 Published: 2007-07-17 Updated: 2011-03-08 Summary: The IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted (1) LAGRQ or (2) LAGRP frame that contains information elements of IAX frames, which results in a NULL pointer dereference when Asterisk does not properly set an associated variable. CVSS v3 Severity: 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Low
CVSS v2 Severity: 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )3.9 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )3.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
Vulnerability Type: CWE-Other Vulnerability Consequences: Denial of Service References: Source: CCN Type: Full-Disclosure Mailing List, Tue Jul 17 2007 - 17:58:14 CDTASA-2007-015: Remote Crash Vulnerability in IAX2 channel driver Source: CCN Type: Full-Disclosure Mailing List, Tue Jul 31 2007 - 15:49:32 CDTASA-2007-015 chan_iax2 DoS Source: CCN Type: Asterisk Web siteAsterisk- Downloads Source: CONFIRM Type: UNKNOWNhttp://bugs.gentoo.org/show_bug.cgi?id=185713 Source: MITRE Type: CNACVE-2007-3763 Source: CCN Type: ASA-2007-015Remote Crash Vulnerability in IAX2 channel driver Source: CONFIRM Type: Patch, Vendor Advisoryhttp://ftp.digium.com/pub/asa/ASA-2007-015.pdf Source: CCN Type: SA26099Asterisk Multiple Vulnerabilities Source: SECUNIA Type: UNKNOWN26099 Source: SECUNIA Type: UNKNOWN29051 Source: GENTOO Type: UNKNOWNGLSA-200802-11 Source: CCN Type: SECTRACK ID: 1018407Asterisk STUN, Skinny Channel Driver, and IAX2 Channel Driver Bugs Let Remote Users Deny Service or Execute Arbitrary Code Source: DEBIAN Type: UNKNOWNDSA-1358 Source: DEBIAN Type: DSA-1358asterisk -- several vulnerabilities Source: CCN Type: GLSA-200802-11Asterisk: Multiple vulnerabilities Source: SUSE Type: UNKNOWNSUSE-SR:2007:015 Source: CCN Type: OSVDB ID: 38195Asterisk IAX2 Channel Driver (chan_iax2) Malformed IAX Frame Remote DoS Source: BID Type: UNKNOWN24950 Source: CCN Type: BID-24950Asterisk Multiple Remote Denial of Service Vulnerabilities Source: SECTRACK Type: UNKNOWN1018407 Source: VUPEN Type: UNKNOWNADV-2007-2563 Source: XF Type: UNKNOWNasterisk-iax2-dos(35465) Source: SUSE Type: SUSE-SR:2007:015SUSE Security Summary Report Vulnerable Configuration: Configuration 1 :cpe:/a:asterisk:asterisk:1.0:*:*:*:*:*:*:* OR cpe:/a:asterisk:asterisk:1.0.6:*:*:*:*:*:*:* OR cpe:/a:asterisk:asterisk:1.0.7:*:*:*:*:*:*:* OR cpe:/a:asterisk:asterisk:1.0.8:*:*:*:*:*:*:* OR cpe:/a:asterisk:asterisk:1.0.9:*:*:*:*:*:*:* OR cpe:/a:asterisk:asterisk:1.0.10:*:*:*:*:*:*:* OR cpe:/a:asterisk:asterisk:1.0.11:*:*:*:*:*:*:* OR cpe:/a:asterisk:asterisk:1.0.12:*:*:*:*:*:*:* OR cpe:/a:asterisk:asterisk:1.2.0_beta1:*:*:*:*:*:*:* OR cpe:/a:asterisk:asterisk:1.2.0_beta2:*:*:*:*:*:*:* OR cpe:/a:asterisk:asterisk:1.2.5:*:*:*:*:*:*:* OR cpe:/a:asterisk:asterisk:1.2.6:*:*:*:*:*:*:* OR cpe:/a:asterisk:asterisk:1.2.7:*:*:*:*:*:*:* OR cpe:/a:asterisk:asterisk:1.2.8:*:*:*:*:*:*:* OR cpe:/a:asterisk:asterisk:1.2.9:*:*:*:*:*:*:* OR cpe:/a:asterisk:asterisk:1.2.10:*:*:*:*:*:*:* OR cpe:/a:asterisk:asterisk:1.2.11:*:*:*:*:*:*:* OR cpe:/a:asterisk:asterisk:1.2.12:*:*:*:*:*:*:* OR cpe:/a:asterisk:asterisk:1.2.13:*:*:*:*:*:*:* OR cpe:/a:asterisk:asterisk:1.2.14:*:*:*:*:*:*:* OR cpe:/a:asterisk:asterisk:1.2.15:*:*:*:*:*:*:* OR cpe:/a:asterisk:asterisk:1.2.16:*:*:*:*:*:*:* OR cpe:/a:asterisk:asterisk:1.2.17:*:*:*:*:*:*:* OR cpe:/a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:* OR cpe:/a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:* OR cpe:/a:asterisk:asterisk:1.4.4_2007-04-27:*:*:*:*:*:*:* OR cpe:/a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:* OR cpe:/a:asterisk:asterisk:a:*:business:*:*:*:*:* OR cpe:/a:asterisk:asterisk:b.1.3.2:*:business:*:*:*:*:* OR cpe:/a:asterisk:asterisk:b.1.3.3:*:business:*:*:*:*:* OR cpe:/a:asterisk:asterisk:b.2.2.0:*:business:*:*:*:*:* OR cpe:/a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:* (Version <= 0.4) OR cpe:/a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:* OR cpe:/a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:* Configuration 2 :cpe:/h:asterisk:s800i_appliance:1.0:*:*:*:*:*:*:* OR cpe:/h:asterisk:s800i_appliance:1.0.1:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
asterisk asterisk 1.0
asterisk asterisk 1.0.6
asterisk asterisk 1.0.7
asterisk asterisk 1.0.8
asterisk asterisk 1.0.9
asterisk asterisk 1.0.10
asterisk asterisk 1.0.11
asterisk asterisk 1.0.12
asterisk asterisk 1.2.0_beta1
asterisk asterisk 1.2.0_beta2
asterisk asterisk 1.2.5
asterisk asterisk 1.2.6
asterisk asterisk 1.2.7
asterisk asterisk 1.2.8
asterisk asterisk 1.2.9
asterisk asterisk 1.2.10
asterisk asterisk 1.2.11
asterisk asterisk 1.2.12
asterisk asterisk 1.2.13
asterisk asterisk 1.2.14
asterisk asterisk 1.2.15
asterisk asterisk 1.2.16
asterisk asterisk 1.2.17
asterisk asterisk 1.4.1
asterisk asterisk 1.4.2
asterisk asterisk 1.4.4_2007-04-27
asterisk asterisk 1.4_beta
asterisk asterisk a
asterisk asterisk b.1.3.2
asterisk asterisk b.1.3.3
asterisk asterisk b.2.2.0
asterisk asterisk appliance developer kit *
asterisk asterisknow beta_5
asterisk asterisknow beta_6
asterisk s800i appliance 1.0
asterisk s800i appliance 1.0.1