CVE-2007-3762 (CNNVD-200707-351)
中文标题:
Asterisk IAX2隧道驱动IAX2_Write函数远程栈溢出漏洞
英文标题:
Stack-based buffer overflow in the IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4...
漏洞描述
中文描述:
Asterisk是开放源码的软件PBX,支持各种VoIP协议和设备。 Asterisk IAX2隧道驱动(chan_iax2)中存在栈溢出漏洞,远程攻击者可能利用此漏洞控制服务器。 如果向chan_iax2传送了数据负载大于4 kB的RTP帧的话,就可能触发这个漏洞。如果要触发这个漏洞,调用iax2_write()的帧应满足以下条件: * 语音或视频帧 * 4字节的时间戳与之前所发送帧高2字节相同 * 格式为预期格式 * 数据负载大于4kB iax2_write()调用iax2_send()发送帧。在iax2_send()中,有一个条件检查确定是否应立即发送帧或排在队列中。如果确定应在队列中之后发送,就会动态的分配iax_frame结构,数据缓冲区大小为ast_frame数据的大小。但是,如果立即发送帧的话,就会使用栈分配的iax_frame,数据缓冲区大小为4096字节。之后,使用iax_frame_wrap()函数将数据从ast_frame结构拷贝到了iax_frame结构,这就可能触发溢出。
英文描述:
Stack-based buffer overflow in the IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to execute arbitrary code by sending a long (1) voice or (2) video RTP frame.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| asterisk | asterisk | 1.0 | - | - |
cpe:2.3:a:asterisk:asterisk:1.0:*:*:*:*:*:*:*
|
| asterisk | asterisk | 1.0.6 | - | - |
cpe:2.3:a:asterisk:asterisk:1.0.6:*:*:*:*:*:*:*
|
| asterisk | asterisk | 1.0.7 | - | - |
cpe:2.3:a:asterisk:asterisk:1.0.7:*:*:*:*:*:*:*
|
| asterisk | asterisk | 1.0.8 | - | - |
cpe:2.3:a:asterisk:asterisk:1.0.8:*:*:*:*:*:*:*
|
| asterisk | asterisk | 1.0.9 | - | - |
cpe:2.3:a:asterisk:asterisk:1.0.9:*:*:*:*:*:*:*
|
| asterisk | asterisk | 1.0.10 | - | - |
cpe:2.3:a:asterisk:asterisk:1.0.10:*:*:*:*:*:*:*
|
| asterisk | asterisk | 1.0.11 | - | - |
cpe:2.3:a:asterisk:asterisk:1.0.11:*:*:*:*:*:*:*
|
| asterisk | asterisk | 1.0.12 | - | - |
cpe:2.3:a:asterisk:asterisk:1.0.12:*:*:*:*:*:*:*
|
| asterisk | asterisk | 1.2.0_beta1 | - | - |
cpe:2.3:a:asterisk:asterisk:1.2.0_beta1:*:*:*:*:*:*:*
|
| asterisk | asterisk | 1.2.0_beta2 | - | - |
cpe:2.3:a:asterisk:asterisk:1.2.0_beta2:*:*:*:*:*:*:*
|
| asterisk | asterisk | 1.2.5 | - | - |
cpe:2.3:a:asterisk:asterisk:1.2.5:*:*:*:*:*:*:*
|
| asterisk | asterisk | 1.2.6 | - | - |
cpe:2.3:a:asterisk:asterisk:1.2.6:*:*:*:*:*:*:*
|
| asterisk | asterisk | 1.2.7 | - | - |
cpe:2.3:a:asterisk:asterisk:1.2.7:*:*:*:*:*:*:*
|
| asterisk | asterisk | 1.2.8 | - | - |
cpe:2.3:a:asterisk:asterisk:1.2.8:*:*:*:*:*:*:*
|
| asterisk | asterisk | 1.2.9 | - | - |
cpe:2.3:a:asterisk:asterisk:1.2.9:*:*:*:*:*:*:*
|
| asterisk | asterisk | 1.2.10 | - | - |
cpe:2.3:a:asterisk:asterisk:1.2.10:*:*:*:*:*:*:*
|
| asterisk | asterisk | 1.2.11 | - | - |
cpe:2.3:a:asterisk:asterisk:1.2.11:*:*:*:*:*:*:*
|
| asterisk | asterisk | 1.2.12 | - | - |
cpe:2.3:a:asterisk:asterisk:1.2.12:*:*:*:*:*:*:*
|
| asterisk | asterisk | 1.2.13 | - | - |
cpe:2.3:a:asterisk:asterisk:1.2.13:*:*:*:*:*:*:*
|
| asterisk | asterisk | 1.2.14 | - | - |
cpe:2.3:a:asterisk:asterisk:1.2.14:*:*:*:*:*:*:*
|
| asterisk | asterisk | 1.2.15 | - | - |
cpe:2.3:a:asterisk:asterisk:1.2.15:*:*:*:*:*:*:*
|
| asterisk | asterisk | 1.2.16 | - | - |
cpe:2.3:a:asterisk:asterisk:1.2.16:*:*:*:*:*:*:*
|
| asterisk | asterisk | 1.2.17 | - | - |
cpe:2.3:a:asterisk:asterisk:1.2.17:*:*:*:*:*:*:*
|
| asterisk | asterisk | 1.4.1 | - | - |
cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*
|
| asterisk | asterisk | 1.4.2 | - | - |
cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*
|
| asterisk | asterisk | 1.4.4_2007-04-27 | - | - |
cpe:2.3:a:asterisk:asterisk:1.4.4_2007-04-27:*:*:*:*:*:*:*
|
| asterisk | asterisk | 1.4_beta | - | - |
cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*
|
| asterisk | asterisk | a | - | - |
cpe:2.3:a:asterisk:asterisk:a:*:business:*:*:*:*:*
|
| asterisk | asterisk | b.1.3.2 | - | - |
cpe:2.3:a:asterisk:asterisk:b.1.3.2:*:business:*:*:*:*:*
|
| asterisk | asterisk | b.1.3.3 | - | - |
cpe:2.3:a:asterisk:asterisk:b.1.3.3:*:business:*:*:*:*:*
|
| asterisk | asterisk | b.2.2.0 | - | - |
cpe:2.3:a:asterisk:asterisk:b.2.2.0:*:business:*:*:*:*:*
|
| asterisk | asterisk_appliance_developer_kit | * | - | - |
cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*
|
| asterisk | asterisknow | beta_5 | - | - |
cpe:2.3:a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:*
|
| asterisk | asterisknow | beta_6 | - | - |
cpe:2.3:a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:*
|
| asterisk | s800i_appliance | 1.0 | - | - |
cpe:2.3:h:asterisk:s800i_appliance:1.0:*:*:*:*:*:*:*
|
| asterisk | s800i_appliance | 1.0.1 | - | - |
cpe:2.3:h:asterisk:s800i_appliance:1.0.1:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
CVSS评分详情
AV:N/AC:M/Au:N/C:C/I:C/A:C
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2007-3762 |
2025-11-11 15:17:54 | 2025-11-11 07:32:45 |
| NVD | nvd_CVE-2007-3762 |
2025-11-11 14:52:11 | 2025-11-11 07:41:31 |
| CNNVD | cnnvd_CNNVD-200707-351 |
2025-11-11 15:08:57 | 2025-11-11 07:49:19 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-200707-351
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.CRITICAL
- cvss_score: 未提取 -> 9.3
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:C/I:C/A:C
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 36
- data_sources: ['cve'] -> ['cve', 'nvd']