Digium Asterisk 0.7/1.4.9/Beta 6 Channel Driver memory allocation

| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.8 | $0-$5k | 0.00 |
Summary
A vulnerability classified as problematic was found in Digium Asterisk 0.7/1.4.9/Beta 6. This affects an unknown part of the component Channel Driver. Executing a manipulation can lead to memory allocation. This vulnerability appears as CVE-2007-4455. The attack may be performed from remote. There is no available exploit. Upgrading the affected component is advised.
Details
A vulnerability classified as problematic was found in Digium Asterisk 0.7/1.4.9/Beta 6 (Communications System). This vulnerability affects an unknown function of the component Channel Driver. The manipulation with an unknown input leads to a memory allocation vulnerability. The CWE definition for the vulnerability is CWE-789. The product allocates memory based on an untrusted, large size value, but it does not ensure that the size is within expected limits, allowing arbitrary amounts of memory to be allocated. As an impact it is known to affect availability. CVE summarizes:
The SIP channel driver (chan_sip) in Asterisk Open Source 1.4.x before 1.4.11, AsteriskNOW before beta7, Asterisk Appliance Developer Kit 0.x before 0.8.0, and s800i (Asterisk Appliance) 1.x before 1.0.3 allows remote attackers to cause a denial of service (memory exhaustion) via a SIP dialog that causes a large number of history entries to be created.
The weakness was presented 08/21/2007 (Website). The advisory is available at vupen.com. This vulnerability was named CVE-2007-4455 since 08/21/2007. The exploitation appears to be easy. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. The technical details are unknown and an exploit is not available.
It is declared as proof-of-concept.
Upgrading to version 0.7 eliminates this vulnerability.
The vulnerability is also documented in the databases at X-Force (36145), SecurityFocus (BID 25392†), Secunia (SA26553†), SecurityTracker (ID 1018595†) and Vulnerability Center (SBV-15976†). If you want to get best quality of vulnerability data, you may have to visit VulDB.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.digium.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 4.8
VulDB Base Score: 5.3
VulDB Temp Score: 4.8
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory allocationCWE: CWE-789 / CWE-400 / CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Proof-of-Concept
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Asterisk 0.7
Timeline
08/21/2007 🔍08/21/2007 🔍
08/21/2007 🔍
08/21/2007 🔍
08/21/2007 🔍
08/22/2007 🔍
08/22/2007 🔍
09/03/2007 🔍
03/16/2015 🔍
12/24/2017 🔍
Sources
Vendor: digium.comAdvisory: vupen.com⛔
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2007-4455 (🔍)
GCVE (CVE): GCVE-0-2007-4455
GCVE (VulDB): GCVE-100-38458
X-Force: 36145
SecurityFocus: 25392 - Asterisk SIP Dialog History Resource Exhaustion Remote Denial of Service Vulnerability
Secunia: 26553 - Asterisk SIP Channel Driver Dialog History Memory Exhaustion, Moderately Critical
SecurityTracker: 1018595 - Asterisk SIP Dialog History Processing Error Lets Remote Users Deny Service
Vulnerability Center: 15976 - Digium Asterisk, AsteriskNOW, Asterisk Appliance Developer Kit and s800i Vulnerability Allows DoS, Medium
Vupen: ADV-2007-2953
Entry
Created: 03/16/2015 12:18Updated: 12/24/2017 09:34
Changes: 03/16/2015 12:18 (54), 12/24/2017 09:34 (17)
Complete: 🔍
Cache ID: 216:40A:103
If you want to get best quality of vulnerability data, you may have to visit VulDB.
No comments yet. Languages: en.
Please log in to comment.