Vulnerability Description
Multiple stack-based buffer overflows in the process_sdp function in chan_sip.c of the SIP channel T.38 SDP parser in Asterisk before 1.4.3 allow remote attackers to execute arbitrary code via a long (1) T38FaxRateManagement or (2) T38FaxUdpEC SDP parameter in an SIP message, as demonstrated using SIP INVITE.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Asterisk | Asterisk | 1.4.1 |
References
- http://secunia.com/advisories/24977PatchVendor Advisory
- http://securityreason.com/securityalert/2645
- http://www.asterisk.org/files/ASA-2007-010.pdf
- http://www.osvdb.org/35368
- http://www.securityfocus.com/archive/1/466883/100/0/threaded
- http://www.securityfocus.com/archive/1/472804/100/0/threaded
- http://www.securityfocus.com/bid/23648ExploitPatch
- http://www.securitytracker.com/id?1017951Patch
- http://www.securitytracker.com/id?1018337
- http://www.vupen.com/english/advisories/2007/1534
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33895
- http://secunia.com/advisories/24977PatchVendor Advisory
- http://securityreason.com/securityalert/2645
- http://www.asterisk.org/files/ASA-2007-010.pdf
- http://www.osvdb.org/35368
FAQ
What is CVE-2007-2293?
CVE-2007-2293 is a vulnerability with a CVSS score of 7.6 (HIGH). Multiple stack-based buffer overflows in the process_sdp function in chan_sip.c of the SIP channel T.38 SDP parser in Asterisk before 1.4.3 allow remote attackers to execute arbitrary code via a long ...
How severe is CVE-2007-2293?
CVE-2007-2293 has been rated HIGH with a CVSS base score of 7.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-2293?
Check the references section above for vendor advisories and patch information. Affected products include: Asterisk Asterisk.