Описание
The STUN implementation in Asterisk 1.4.x before 1.4.8, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted STUN length attribute in a STUN packet sent on an RTP port.
The STUN implementation in Asterisk 1.4.x before 1.4.8, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted STUN length attribute in a STUN packet sent on an RTP port.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2007-3765
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35480
- http://ftp.digium.com/pub/asa/ASA-2007-017.pdf
- http://secunia.com/advisories/26099
- http://www.securityfocus.com/bid/24950
- http://www.securitytracker.com/id?1018407
- http://www.vupen.com/english/advisories/2007/2563
EPSS
CVE ID
Связанные уязвимости
The STUN implementation in Asterisk 1.4.x before 1.4.8, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted STUN length attribute in a STUN packet sent on an RTP port.
The STUN implementation in Asterisk 1.4.x before 1.4.8, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted STUN length attribute in a STUN packet sent on an RTP port.
The STUN implementation in Asterisk 1.4.x before 1.4.8, AsteriskNOW be ...
EPSS