The STUN implementation in Asterisk 1.4.x before 1.4.8, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted STUN length attribute in a STUN packet sent on an RTP port.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 00:34
Type | Values Removed | Values Added |
---|---|---|
References | () http://ftp.digium.com/pub/asa/ASA-2007-017.pdf - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/26099 - | |
References | () http://www.securityfocus.com/bid/24950 - | |
References | () http://www.securitytracker.com/id?1018407 - | |
References | () http://www.vupen.com/english/advisories/2007/2563 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/35480 - |
Information
Published : 2007-07-18 17:30
Updated : 2024-11-21 00:34
NVD link : CVE-2007-3765
Mitre link : CVE-2007-3765
CVE.ORG link : CVE-2007-3765
JSON object : View
Products Affected
asterisk
- asterisk
- asterisknow
- s800i_appliance
- asterisk_appliance_developer_kit
CWE