Denial of Service Vulnerability in Asterisk SIP Channel Driver by Digium
CVE-2007-4455
Currently unrated
Summary
The SIP channel driver (chan_sip) in Asterisk is prone to a resource exhaustion vulnerability that can be exploited remotely. Attackers can initiate a SIP dialog that generates an excessive number of history entries, ultimately leading to memory depletion. This creates significant performance issues and can render the affected Asterisk systems unresponsive. To mitigate this vulnerability, users should upgrade to the latest versions of Asterisk, as outlined in the related advisories.
References
EPSS Score
5% chance of being exploited in the next 30 days.
Timeline
Vulnerability published
Vulnerability Reserved