Buffer Overflow Vulnerability in Asterisk IAX2 Channel Driver
CVE-2007-3762
Currently unrated
Key Information:
- Vendor
- Asterisk
- Vendor
- CVE Published:
- 18 July 2007
Summary
The IAX2 channel driver in Asterisk is vulnerable to a stack-based buffer overflow, which can be exploited by remote attackers to execute arbitrary code. This occurs when an attacker sends a specially crafted voice or video RTP frame that exceeds the expected length, compromising the system's integrity and functionality. Affected versions include those prior to Asterisk 1.2.22 and 1.4.x before 1.4.8, as well as various editions and developer kits. It is essential for users to ensure that their systems are updated to mitigate this risk.
References
EPSS Score
9% chance of being exploited in the next 30 days.
Timeline
Vulnerability published
Vulnerability Reserved