Описание
Asterisk 1.4 before 1.4.1 and 1.2 before 1.2.16 allows remote attackers to cause a denial of service (crash) by sending a Session Initiation Protocol (SIP) packet without a URI and SIP-version header, which results in a NULL pointer dereference.
Asterisk 1.4 before 1.4.1 and 1.2 before 1.2.16 allows remote attackers to cause a denial of service (crash) by sending a Session Initiation Protocol (SIP) packet without a URI and SIP-version header, which results in a NULL pointer dereference.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2007-1306
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32830
- http://asterisk.org/node/48319
- http://asterisk.org/node/48320
- http://labs.musecurity.com/advisories/MU-200703-01.txt
- http://secunia.com/advisories/24380
- http://secunia.com/advisories/24578
- http://secunia.com/advisories/25582
- http://security.gentoo.org/glsa/glsa-200703-14.xml
- http://www.debian.org/security/2007/dsa-1358
- http://www.kb.cert.org/vuls/id/228032
- http://www.novell.com/linux/security/advisories/2007_34_asterisk.html
- http://www.osvdb.org/33888
- http://www.securityfocus.com/bid/22838
- http://www.securitytracker.com/id?1017723
- http://www.vupen.com/english/advisories/2007/0830
EPSS
CVE ID
Связанные уязвимости
Asterisk 1.4 before 1.4.1 and 1.2 before 1.2.16 allows remote attackers to cause a denial of service (crash) by sending a Session Initiation Protocol (SIP) packet without a URI and SIP-version header, which results in a NULL pointer dereference.
Asterisk 1.4 before 1.4.1 and 1.2 before 1.2.16 allows remote attackers to cause a denial of service (crash) by sending a Session Initiation Protocol (SIP) packet without a URI and SIP-version header, which results in a NULL pointer dereference.
Asterisk 1.4 before 1.4.1 and 1.2 before 1.2.16 allows remote attacker ...
EPSS