The IAX2 channel driver (chan_iax2) in Asterisk Open 1.2.x before 1.2.23, 1.4.x before 1.4.9, and Asterisk Appliance Developer Kit before 0.6.0, when configured to allow unauthenticated calls, allows remote attackers to cause a denial of service (resource exhaustion) via a flood of calls that do not complete a 3-way handshake, which causes an ast_channel to be allocated but not released.
References
Link | Resource |
---|---|
http://bugs.gentoo.org/show_bug.cgi?id=185713 | Issue Tracking Patch |
http://ftp.digium.com/pub/asa/ASA-2007-018.pdf | Broken Link Patch |
http://osvdb.org/38197 | Broken Link |
http://secunia.com/advisories/26274 | Broken Link Patch Vendor Advisory |
http://secunia.com/advisories/29051 | Broken Link |
http://security.gentoo.org/glsa/glsa-200802-11.xml | Third Party Advisory |
http://securityreason.com/securityalert/2960 | Broken Link |
http://www.securityfocus.com/archive/1/475069/100/0/threaded | Broken Link Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/24950 | Broken Link Third Party Advisory VDB Entry |
http://www.securitytracker.com/id?1018472 | Broken Link Third Party Advisory VDB Entry |
http://www.vupen.com/english/advisories/2007/2701 | Broken Link |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2007-07-31 10:17
Updated : 2024-02-08 20:12
NVD link : CVE-2007-4103
Mitre link : CVE-2007-4103
CVE.ORG link : CVE-2007-4103
JSON object : View
Products Affected
digium
- asterisk
- asterisk_appliance_developer_kit
CWE
CWE-772
Missing Release of Resource after Effective Lifetime