CVE-2007-1306
Published Mar 7, 2007
Last updated 7 years ago
Overview
- Description
- Asterisk 1.4 before 1.4.1 and 1.2 before 1.2.16 allows remote attackers to cause a denial of service (crash) by sending a Session Initiation Protocol (SIP) packet without a URI and SIP-version header, which results in a NULL pointer dereference.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.8
- Impact score
- 6.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Evaluator
- Comment
- Per: http://cwe.mitre.org/data/definitions/476.html 'CWE-476: NULL Pointer Dereference'
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.2.0_beta1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4042CC21-F3CB-4C77-9E60-AF8AA9A191C7" }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.0_beta2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C656168D-7D6A-4E84-9196-A8B170E1F7CF" }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C619138A-557F-419E-9832-D0FB0E9042C9" }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6656EA0-4D4F-4251-A30F-48375C5CE3E0" }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4AAD9104-BA4A-478F-9B56-195E0F9A7DF5" }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F06C361-D7DF-474B-A835-BA8886C11A80" }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "175954A5-E712-41B8-BC11-4F999343063D" }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1DF9E41E-8FE6-4396-A5D4-D4568600FE03" }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4457486F-E9B4-46B8-A05D-3B32F8B639A4" }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.12.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "69417F54-D92F-46FB-9BFA-995211279C0E" }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4611BEA0-25EC-4705-A390-6DF678373FF0" }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "53022458-F443-4402-AC52-FC3AE810E89E" }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "120B85AA-E9B8-4A4D-81CE-FD36CDB63074" }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2_beta1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61FAB63F-B9F8-4D39-AEE9-BC0E54BAA944" }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2_beta2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1BC20315-40B5-4DA1-AC49-E911C03AEA6B" }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E56DB29-571D-4615-B347-38CF4590E463" }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0_beta1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B909947-44E3-463E-9FAD-76C8E21A54E7" }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0_beta2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1FB2F8AA-B70B-4280-BDBD-023037C16D70" } ], "operator": "OR" } ] } ]