Vulnerability Description
Buffer overflow in sethdlc.c in the Asterisk Zaptel 1.4.5.1 might allow local users to gain privileges via a long device name (interface name) in the ifr_name field. NOTE: the vendor disputes this issue, stating that the application requires root access, so privilege boundaries are not crossed
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Asterisk | Zaptel | 1.4.5.1 |
Related Weaknesses (CWE)
References
- http://downloads.digium.com/pub/asa/AST-2007-024.html
- http://securityreason.com/securityalert/3319
- http://www.eleytt.com/advisories/eleytt_ZAPTEL.pdf
- http://www.securityfocus.com/archive/1/482597/100/0/threaded
- http://www.securityfocus.com/archive/1/483481/100/0/threaded
- http://www.securityfocus.com/bid/26160
- http://www.securitytracker.com/id?1018885
- https://exchange.xforce.ibmcloud.com/vulnerabilities/37335
- http://downloads.digium.com/pub/asa/AST-2007-024.html
- http://securityreason.com/securityalert/3319
- http://www.eleytt.com/advisories/eleytt_ZAPTEL.pdf
- http://www.securityfocus.com/archive/1/482597/100/0/threaded
- http://www.securityfocus.com/archive/1/483481/100/0/threaded
- http://www.securityfocus.com/bid/26160
- http://www.securitytracker.com/id?1018885
FAQ
What is CVE-2007-5690?
CVE-2007-5690 is a vulnerability with a CVSS score of 4.6 (MEDIUM). Buffer overflow in sethdlc.c in the Asterisk Zaptel 1.4.5.1 might allow local users to gain privileges via a long device name (interface name) in the ifr_name field. NOTE: the vendor disputes this is...
How severe is CVE-2007-5690?
CVE-2007-5690 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-5690?
Check the references section above for vendor advisories and patch information. Affected products include: Asterisk Zaptel.