CVE-2007-4103

The IAX2 channel driver (chan_iax2) in Asterisk Open 1.2.x before 1.2.23, 1.4.x before 1.4.9, and Asterisk Appliance Developer Kit before 0.6.0, when configured to allow unauthenticated calls, allows remote attackers to cause a denial of service (resource exhaustion) via a flood of calls that do not complete a 3-way handshake, which causes an ast_channel to be allocated but not released.
References
Link Resource
http://bugs.gentoo.org/show_bug.cgi?id=185713 Issue Tracking Patch
http://ftp.digium.com/pub/asa/ASA-2007-018.pdf Broken Link Patch
http://osvdb.org/38197 Broken Link
http://secunia.com/advisories/26274 Broken Link Patch Vendor Advisory
http://secunia.com/advisories/29051 Broken Link
http://security.gentoo.org/glsa/glsa-200802-11.xml Third Party Advisory
http://securityreason.com/securityalert/2960 Broken Link
http://www.securityfocus.com/archive/1/475069/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/24950 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1018472 Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2007/2701 Broken Link
http://bugs.gentoo.org/show_bug.cgi?id=185713 Issue Tracking Patch
http://ftp.digium.com/pub/asa/ASA-2007-018.pdf Broken Link Patch
http://osvdb.org/38197 Broken Link
http://secunia.com/advisories/26274 Broken Link Patch Vendor Advisory
http://secunia.com/advisories/29051 Broken Link
http://security.gentoo.org/glsa/glsa-200802-11.xml Third Party Advisory
http://securityreason.com/securityalert/2960 Broken Link
http://www.securityfocus.com/archive/1/475069/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/24950 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1018472 Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2007/2701 Broken Link
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:34

Type Values Removed Values Added
References () http://bugs.gentoo.org/show_bug.cgi?id=185713 - Issue Tracking, Patch () http://bugs.gentoo.org/show_bug.cgi?id=185713 - Issue Tracking, Patch
References () http://ftp.digium.com/pub/asa/ASA-2007-018.pdf - Broken Link, Patch () http://ftp.digium.com/pub/asa/ASA-2007-018.pdf - Broken Link, Patch
References () http://osvdb.org/38197 - Broken Link () http://osvdb.org/38197 - Broken Link
References () http://secunia.com/advisories/26274 - Broken Link, Patch, Vendor Advisory () http://secunia.com/advisories/26274 - Broken Link, Patch, Vendor Advisory
References () http://secunia.com/advisories/29051 - Broken Link () http://secunia.com/advisories/29051 - Broken Link
References () http://security.gentoo.org/glsa/glsa-200802-11.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-200802-11.xml - Third Party Advisory
References () http://securityreason.com/securityalert/2960 - Broken Link () http://securityreason.com/securityalert/2960 - Broken Link
References () http://www.securityfocus.com/archive/1/475069/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/475069/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/24950 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/24950 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id?1018472 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id?1018472 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2007/2701 - Broken Link () http://www.vupen.com/english/advisories/2007/2701 - Broken Link

08 Feb 2024, 20:12

Type Values Removed Values Added
References (GENTOO) http://security.gentoo.org/glsa/glsa-200802-11.xml - (GENTOO) http://security.gentoo.org/glsa/glsa-200802-11.xml - Third Party Advisory
References (CONFIRM) http://ftp.digium.com/pub/asa/ASA-2007-018.pdf - Patch (CONFIRM) http://ftp.digium.com/pub/asa/ASA-2007-018.pdf - Broken Link, Patch
References (SECUNIA) http://secunia.com/advisories/26274 - Patch, Vendor Advisory (SECUNIA) http://secunia.com/advisories/26274 - Broken Link, Patch, Vendor Advisory
References (SECTRACK) http://www.securitytracker.com/id?1018472 - (SECTRACK) http://www.securitytracker.com/id?1018472 - Broken Link, Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/29051 - (SECUNIA) http://secunia.com/advisories/29051 - Broken Link
References (BUGTRAQ) http://www.securityfocus.com/archive/1/475069/100/0/threaded - (BUGTRAQ) http://www.securityfocus.com/archive/1/475069/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References (BID) http://www.securityfocus.com/bid/24950 - (BID) http://www.securityfocus.com/bid/24950 - Broken Link, Third Party Advisory, VDB Entry
References (VUPEN) http://www.vupen.com/english/advisories/2007/2701 - (VUPEN) http://www.vupen.com/english/advisories/2007/2701 - Broken Link
References (SREASON) http://securityreason.com/securityalert/2960 - (SREASON) http://securityreason.com/securityalert/2960 - Broken Link
References (CONFIRM) http://bugs.gentoo.org/show_bug.cgi?id=185713 - (CONFIRM) http://bugs.gentoo.org/show_bug.cgi?id=185713 - Issue Tracking, Patch
References (OSVDB) http://osvdb.org/38197 - (OSVDB) http://osvdb.org/38197 - Broken Link
CVSS v2 : 7.8
v3 : unknown
v2 : 7.8
v3 : 7.5
CPE cpe:2.3:a:digium:asterisk:1.4.7.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.21.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk_appliance_developer_kit:0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.7:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.22:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.21:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.20:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisknow_pre-release:beta6:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.5:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.8:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*
CWE NVD-CWE-Other CWE-772

Information

Published : 2007-07-31 10:17

Updated : 2024-11-21 00:34


NVD link : CVE-2007-4103

Mitre link : CVE-2007-4103

CVE.ORG link : CVE-2007-4103


JSON object : View

Products Affected

digium

  • asterisk
  • asterisk_appliance_developer_kit
CWE
CWE-772

Missing Release of Resource after Effective Lifetime