Buffer Overflow Vulnerability in Asterisk IAX2 Channel Driver
CVE-2007-3762

Currently unrated

Key Information:

Vendor
Asterisk
Vendor
CVE Published:
18 July 2007

Summary

The IAX2 channel driver in Asterisk is vulnerable to a stack-based buffer overflow, which can be exploited by remote attackers to execute arbitrary code. This occurs when an attacker sends a specially crafted voice or video RTP frame that exceeds the expected length, compromising the system's integrity and functionality. Affected versions include those prior to Asterisk 1.2.22 and 1.4.x before 1.4.8, as well as various editions and developer kits. It is essential for users to ensure that their systems are updated to mitigate this risk.

References

EPSS Score

9% chance of being exploited in the next 30 days.

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2007-3762 : Buffer Overflow Vulnerability in Asterisk IAX2 Channel Driver | SecurityVulnerability.io