Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2007-2293

Опубликовано: 26 апр. 2007
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 7.6

Описание

Multiple stack-based buffer overflows in the process_sdp function in chan_sip.c of the SIP channel T.38 SDP parser in Asterisk before 1.4.3 allow remote attackers to execute arbitrary code via a long (1) T38FaxRateManagement or (2) T38FaxUdpEC SDP parameter in an SIP message, as demonstrated using SIP INVITE.

РелизСтатусПримечание
dapper

not-affected

devel

not-affected

edgy

not-affected

feisty

not-affected

upstream

needs-triage

Показывать по

Ссылки на источники

EPSS

Процентиль: 97%
0.40706
Средний

7.6 High

CVSS2

Связанные уязвимости

nvd
больше 18 лет назад

Multiple stack-based buffer overflows in the process_sdp function in chan_sip.c of the SIP channel T.38 SDP parser in Asterisk before 1.4.3 allow remote attackers to execute arbitrary code via a long (1) T38FaxRateManagement or (2) T38FaxUdpEC SDP parameter in an SIP message, as demonstrated using SIP INVITE.

debian
больше 18 лет назад

Multiple stack-based buffer overflows in the process_sdp function in c ...

github
больше 3 лет назад

Multiple stack-based buffer overflows in the process_sdp function in chan_sip.c of the SIP channel T.38 SDP parser in Asterisk before 1.4.3 allow remote attackers to execute arbitrary code via a long (1) T38FaxRateManagement or (2) T38FaxUdpEC SDP parameter in an SIP message, as demonstrated using SIP INVITE.

EPSS

Процентиль: 97%
0.40706
Средний

7.6 High

CVSS2