CVE-2007-1561
Asterisk 1.2.16/1.4.1 - SIP INVITE Remote Denial of Service
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The channel driver in Asterisk before 1.2.17 and 1.4.x before 1.4.2 allows remote attackers to cause a denial of service (crash) via a SIP INVITE message with an SDP containing one valid and one invalid IP address.
El controlador del canal en Asterisk en versiones anteriores a 1.2.17 y 1.4.x en versiones anteriores a 1.4.2 permite a atacantes remotos provocar una denegación de servicio (caída) a través de un mensaje SIP INVITE con un SDP que contiene una dirección IP válida y otra no válida.
The Madynes research team at INRIA has discovered that Asterisk contains a null pointer dereferencing error in the SIP channel when handling INVITE messages. Furthermore qwerty1979 discovered that Asterisk 1.2.x fails to properly handle SIP responses with return code 0. Versions less than 1.2.14-r2 are affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2007-03-21 CVE Reserved
- 2007-03-21 CVE Published
- 2007-03-25 First Exploit
- 2024-08-07 CVE Updated
- 2025-06-04 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (17)
URL | Tag | Source |
---|---|---|
http://asterisk.org/node/48339 | X_refsource_confirm | |
http://marc.info/?l=full-disclosure&m=117432783011737&w=2 | Mailing List | |
http://secunia.com/advisories/24564 | Third Party Advisory | |
http://secunia.com/advisories/24719 | Third Party Advisory | |
http://secunia.com/advisories/25582 | Third Party Advisory | |
http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html | Mailing List | |
http://www.osvdb.org/34479 | Vdb Entry | |
http://www.securityfocus.com/archive/1/463434/100/0/threaded | Mailing List | |
http://www.securitytracker.com/id?1017794 | Vdb Entry | |
http://www.sineapps.com/news.php?rssid=1707 | X_refsource_confirm | |
http://www.vupen.com/english/advisories/2007/1039 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/33068 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/3566 | 2007-03-25 |
URL | Date | SRC |
---|---|---|
http://www.securityfocus.com/bid/23031 | 2018-10-16 |
URL | Date | SRC |
---|---|---|
http://security.gentoo.org/glsa/glsa-200704-01.xml | 2018-10-16 | |
http://www.debian.org/security/2007/dsa-1358 | 2018-10-16 | |
http://www.novell.com/linux/security/advisories/2007_34_asterisk.html | 2018-10-16 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Asterisk Search vendor "Asterisk" | Asterisk Search vendor "Asterisk" for product "Asterisk" | 1.2.14 Search vendor "Asterisk" for product "Asterisk" and version "1.2.14" | - |
Affected
| ||||||
Asterisk Search vendor "Asterisk" | Asterisk Search vendor "Asterisk" for product "Asterisk" | 1.2.15 Search vendor "Asterisk" for product "Asterisk" and version "1.2.15" | - |
Affected
| ||||||
Asterisk Search vendor "Asterisk" | Asterisk Search vendor "Asterisk" for product "Asterisk" | 1.2.16 Search vendor "Asterisk" for product "Asterisk" and version "1.2.16" | - |
Affected
| ||||||
Asterisk Search vendor "Asterisk" | Asterisk Search vendor "Asterisk" for product "Asterisk" | 1.4.1 Search vendor "Asterisk" for product "Asterisk" and version "1.4.1" | - |
Affected
|