CVE-2007-3763 (CNNVD-200707-335)

MEDIUM 有利用代码
中文标题:
Asterisk IAX2 隧道驱动拒绝服务攻击漏洞
英文标题:
The IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Editi...
CVSS分数: 5.0
发布时间: 2007-07-18 17:00:00
漏洞类型: 其他
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v4
漏洞描述
中文描述:

Asterisk是开放源码的软件PBX,支持各种VoIP协议和设备。 Asterisk IAX2的隧道驱动(chan_iax2)中存在拒绝服务漏洞。如果Asterisk在有效会话中接收到了LAGRQ或LAGRP帧,就可能触发空指针异常。负责解析入站帧的代码可以正确地解析IAX帧中的信息单元,然后将指针设置为空表示没有与这个帧相关的原始数据负载,但没有将原始负载中用于表示字节数的变量设置为0。由于原始数据长度为非0,处理LAGRQ和LAGRP帧的代码就会试图从空指针拷贝数据,导致崩溃。

英文描述:

The IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted (1) LAGRQ or (2) LAGRP frame that contains information elements of IAX frames, which results in a NULL pointer dereference when Asterisk does not properly set an associated variable.

CWE类型:
(暂无数据)
标签:
dos multiple tenkei_ev
受影响产品
厂商 产品 版本 版本范围 平台 CPE
asterisk asterisk 1.0 - - cpe:2.3:a:asterisk:asterisk:1.0:*:*:*:*:*:*:*
asterisk asterisk 1.0.6 - - cpe:2.3:a:asterisk:asterisk:1.0.6:*:*:*:*:*:*:*
asterisk asterisk 1.0.7 - - cpe:2.3:a:asterisk:asterisk:1.0.7:*:*:*:*:*:*:*
asterisk asterisk 1.0.8 - - cpe:2.3:a:asterisk:asterisk:1.0.8:*:*:*:*:*:*:*
asterisk asterisk 1.0.9 - - cpe:2.3:a:asterisk:asterisk:1.0.9:*:*:*:*:*:*:*
asterisk asterisk 1.0.10 - - cpe:2.3:a:asterisk:asterisk:1.0.10:*:*:*:*:*:*:*
asterisk asterisk 1.0.11 - - cpe:2.3:a:asterisk:asterisk:1.0.11:*:*:*:*:*:*:*
asterisk asterisk 1.0.12 - - cpe:2.3:a:asterisk:asterisk:1.0.12:*:*:*:*:*:*:*
asterisk asterisk 1.2.0_beta1 - - cpe:2.3:a:asterisk:asterisk:1.2.0_beta1:*:*:*:*:*:*:*
asterisk asterisk 1.2.0_beta2 - - cpe:2.3:a:asterisk:asterisk:1.2.0_beta2:*:*:*:*:*:*:*
asterisk asterisk 1.2.5 - - cpe:2.3:a:asterisk:asterisk:1.2.5:*:*:*:*:*:*:*
asterisk asterisk 1.2.6 - - cpe:2.3:a:asterisk:asterisk:1.2.6:*:*:*:*:*:*:*
asterisk asterisk 1.2.7 - - cpe:2.3:a:asterisk:asterisk:1.2.7:*:*:*:*:*:*:*
asterisk asterisk 1.2.8 - - cpe:2.3:a:asterisk:asterisk:1.2.8:*:*:*:*:*:*:*
asterisk asterisk 1.2.9 - - cpe:2.3:a:asterisk:asterisk:1.2.9:*:*:*:*:*:*:*
asterisk asterisk 1.2.10 - - cpe:2.3:a:asterisk:asterisk:1.2.10:*:*:*:*:*:*:*
asterisk asterisk 1.2.11 - - cpe:2.3:a:asterisk:asterisk:1.2.11:*:*:*:*:*:*:*
asterisk asterisk 1.2.12 - - cpe:2.3:a:asterisk:asterisk:1.2.12:*:*:*:*:*:*:*
asterisk asterisk 1.2.13 - - cpe:2.3:a:asterisk:asterisk:1.2.13:*:*:*:*:*:*:*
asterisk asterisk 1.2.14 - - cpe:2.3:a:asterisk:asterisk:1.2.14:*:*:*:*:*:*:*
asterisk asterisk 1.2.15 - - cpe:2.3:a:asterisk:asterisk:1.2.15:*:*:*:*:*:*:*
asterisk asterisk 1.2.16 - - cpe:2.3:a:asterisk:asterisk:1.2.16:*:*:*:*:*:*:*
asterisk asterisk 1.2.17 - - cpe:2.3:a:asterisk:asterisk:1.2.17:*:*:*:*:*:*:*
asterisk asterisk 1.4.1 - - cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*
asterisk asterisk 1.4.2 - - cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*
asterisk asterisk 1.4.4_2007-04-27 - - cpe:2.3:a:asterisk:asterisk:1.4.4_2007-04-27:*:*:*:*:*:*:*
asterisk asterisk 1.4_beta - - cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*
asterisk asterisk a - - cpe:2.3:a:asterisk:asterisk:a:*:business:*:*:*:*:*
asterisk asterisk b.1.3.2 - - cpe:2.3:a:asterisk:asterisk:b.1.3.2:*:business:*:*:*:*:*
asterisk asterisk b.1.3.3 - - cpe:2.3:a:asterisk:asterisk:b.1.3.3:*:business:*:*:*:*:*
asterisk asterisk b.2.2.0 - - cpe:2.3:a:asterisk:asterisk:b.2.2.0:*:business:*:*:*:*:*
asterisk asterisk_appliance_developer_kit * - - cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*
asterisk asterisknow beta_5 - - cpe:2.3:a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:*
asterisk asterisknow beta_6 - - cpe:2.3:a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:*
asterisk s800i_appliance 1.0 - - cpe:2.3:h:asterisk:s800i_appliance:1.0:*:*:*:*:*:*:*
asterisk s800i_appliance 1.0.1 - - cpe:2.3:h:asterisk:s800i_appliance:1.0.1:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题 x_refsource_CONFIRM
cve.org
访问
26099 third-party-advisory
cve.org
访问
24950 vdb-entry
cve.org
访问
1018407 vdb-entry
cve.org
访问
GLSA-200802-11 vendor-advisory
cve.org
访问
29051 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
ADV-2007-2563 vdb-entry
cve.org
访问
DSA-1358 vendor-advisory
cve.org
访问
SUSE-SR:2007:015 vendor-advisory
cve.org
访问
ExploitDB EDB-4249 EXPLOIT
exploitdb
访问
Download Exploit EDB-4249 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2007-3763 ADVISORY
cve.org
访问
CVSS评分详情
5.0
MEDIUM
CVSS向量: AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS版本: 2.0
机密性
NONE
完整性
NONE
可用性
PARTIAL
时间信息
发布时间:
2007-07-18 17:00:00
修改时间:
2024-08-07 14:28:52
创建时间:
2025-11-11 15:32:45
更新时间:
2026-01-26 02:17:51
利用信息
此漏洞有可利用代码!
利用代码数量: 1
利用来源:
未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2007-3763 2025-11-11 15:17:54 2025-11-11 07:32:45
NVD nvd_CVE-2007-3763 2025-11-11 14:52:11 2025-11-11 07:41:31
CNNVD cnnvd_CNNVD-200707-335 2025-11-11 15:08:57 2025-11-11 07:49:19
EXPLOITDB exploitdb_EDB-4249 2025-11-11 15:05:27 2025-11-11 08:44:22
版本与语言
当前版本: v4
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
安全公告
暂无安全公告信息
变更历史
v4 EXPLOITDB
2025-11-11 16:44:22
references_count: 10 → 13; tags_count: 0 → 3; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 10 -> 13
  • tags_count: 0 -> 3
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:49:19
vulnerability_type: 未提取 → 其他; cnnvd_id: 未提取 → CNNVD-200707-335; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 其他
  • cnnvd_id: 未提取 -> CNNVD-200707-335
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:31
cvss_score: 未提取 → 5.0; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:N/I:N/A:P; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 36; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • cvss_score: 未提取 -> 5.0
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:N/I:N/A:P
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 36
  • data_sources: ['cve'] -> ['cve', 'nvd']