Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2007-5469

Опубликовано: 16 окт. 2007
Источник: ubuntu
Приоритет: negligible
EPSS Низкий
CVSS2: 5

Описание

OpenSER 1.2.2 does not verify the Digest authentication header URI against the Request URI in SIP messages, which allows remote attackers to use sniffed Digest authentication credentials to call arbitrary telephone numbers or spoof caller ID (aka "toll fraud and authentication forward attack"). NOTE: Debian disputes this issue, stating that "having the two URIs mismatch is allowed by the standard and happens in some setups for valid reasons.

РелизСтатусПримечание
dapper

DNE

devel

ignored

edgy

DNE

feisty

ignored

gutsy

ignored

upstream

needs-triage

Показывать по

Ссылки на источники

EPSS

Процентиль: 67%
0.00562
Низкий

5 Medium

CVSS2

Связанные уязвимости

nvd
почти 18 лет назад

OpenSER 1.2.2 does not verify the Digest authentication header URI against the Request URI in SIP messages, which allows remote attackers to use sniffed Digest authentication credentials to call arbitrary telephone numbers or spoof caller ID (aka "toll fraud and authentication forward attack"). NOTE: Debian disputes this issue, stating that "having the two URIs mismatch is allowed by the standard and happens in some setups for valid reasons.

debian
почти 18 лет назад

OpenSER 1.2.2 does not verify the Digest authentication header URI aga ...

github
больше 3 лет назад

** DISPUTED ** OpenSER 1.2.2 does not verify the Digest authentication header URI against the Request URI in SIP messages, which allows remote attackers to use sniffed Digest authentication credentials to call arbitrary telephone numbers or spoof caller ID (aka "toll fraud and authentication forward attack"). NOTE: Debian disputes this issue, stating that "having the two URIs mismatch is allowed by the standard and happens in some setups for valid reasons."

EPSS

Процентиль: 67%
0.00562
Низкий

5 Medium

CVSS2