Buffer overflow in the get_msg_text of chan_sip.c in the Session Initiation Protocol (SIP) protocol implementation for Asterisk releases before August 15, 2003, allows remote attackers to execute arbitrary code via certain (1) MESSAGE or (2) INFO requests.
References
Link | Resource |
---|---|
http://www.atstake.com/research/advisories/2003/a090403-1.txt | Exploit Vendor Advisory |
http://www.atstake.com/research/advisories/2003/a090403-1.txt | Exploit Vendor Advisory |
Configurations
History
20 Nov 2024, 23:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.atstake.com/research/advisories/2003/a090403-1.txt - Exploit, Vendor Advisory |
Information
Published : 2003-09-17 04:00
Updated : 2024-11-20 23:45
NVD link : CVE-2003-0761
Mitre link : CVE-2003-0761
CVE.ORG link : CVE-2003-0761
JSON object : View
Products Affected
digium
- asterisk
CWE