Show plain JSON{"id": "CVE-2007-1594", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2007-03-22T23:19:00.000", "references": [{"url": "http://bugs.digium.com/view.php?id=9313", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/24579", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/24719", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/25582", "source": "cve@mitre.org"}, {"url": "http://security.gentoo.org/glsa/glsa-200704-01.xml", "source": "cve@mitre.org"}, {"url": "http://svn.digium.com/view/asterisk/trunk/channels/chan_sip.c?r1=58907&r2=59038", "source": "cve@mitre.org"}, {"url": "http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.asterisk.org/node/48338", "source": "cve@mitre.org"}, {"url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/463434/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/23093", "source": "cve@mitre.org"}, {"url": "http://www.securitytracker.com/id?1017809", "source": "cve@mitre.org"}, {"url": "http://www.sineapps.com/news.php?rssid=1707", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.vupen.com/english/advisories/2007/1077", "source": "cve@mitre.org"}, {"url": "http://bugs.digium.com/view.php?id=9313", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/24579", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/24719", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/25582", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://security.gentoo.org/glsa/glsa-200704-01.xml", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://svn.digium.com/view/asterisk/trunk/channels/chan_sip.c?r1=58907&r2=59038", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.asterisk.org/node/48338", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/463434/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/23093", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id?1017809", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.sineapps.com/news.php?rssid=1707", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2007/1077", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "The handle_response function in chan_sip.c in Asterisk before 1.2.17 and 1.4.x before 1.4.2 allows remote attackers to cause a denial of service (crash) via a SIP Response code 0 in a SIP packet."}, {"lang": "es", "value": "La funci\u00f3n handle_response en chan_sip.c de Asterisk before 1.2.17 y 1.4.x versiones anteriores a 1.4.2 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante una respuesta SIP c\u00f3digo 0 en un paquete SIP."}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:asterisk:asterisk:0.1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "74257EDA-40C0-4762-8184-1526B5682326"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:0.1.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FAF09DF6-3E23-4139-92A2-DC44D2A2CF89"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:0.1.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3003B53D-F21C-4D37-903D-D6F51EF6E63E"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:0.1.9_1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BF3E676F-0559-4135-8B01-27A808363F21"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:0.1.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3B67F4F2-CDB9-46C1-AE4C-3E183E54693A"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B4D46FC-06D3-4022-B971-0BA11868486B"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5C3C518-8427-40F1-832C-31D414DB9A80"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "77038CD8-F21A-4372-8D23-1A2563865334"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:0.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B60E0BAB-6D6E-48DB-92A9-62769E25C024"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:0.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB40890B-5C7C-4BDD-8579-80C75C259570"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:0.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "323CDA8E-FBB4-455F-BC72-A3588FE0014B"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:0.9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "09BDB6F9-A258-4537-BEFB-BB18A38B1071"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "54F50B72-EFB3-448F-A2B8-C2BE4D4BF341"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:1.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "69BE50A7-FCA8-470A-B212-A516224306EA"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:1.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E306F943-ECA2-41C8-8C5D-F6A3D68ECE79"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:1.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C309D90-24ED-4DC7-A770-783A7E28705F"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:1.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B6DFD0D-86CE-4423-A0F4-C3581F916038"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:1.0.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "77255177-4EB2-47F5-8B3A-F6164C3C8173"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:1.0.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2145ECD7-D734-4D58-8474-2F38DF9DB94F"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:1.0.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38C3AAB7-EA93-40BA-8ADE-380DA3520747"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E97310AF-E163-4C4F-A0BE-2940A67C336B"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.0_beta2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "66A7A018-4EB6-4C15-9A22-E4299A6919C6"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A7A7F90E-4600-4058-BB10-E39BE8F4968F"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5722AD0B-B329-4DA3-A251-A18DD6EE505E"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18B8E66C-B2EB-4F1F-9226-07A957885D8E"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ECD3CBC1-1371-440A-9EA1-7495A4FA2C49"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B4841AD-96B7-4518-AC3E-3D23C88C083B"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C89A173C-C64A-440F-BCC6-EDE692521171"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C716CAB8-5F2D-44DA-982B-3A47B3B59A1A"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F0FABB45-93A9-49BB-93DA-D13305E2FF84"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5F82331-A7C1-4166-AE45-A83BD7FC3D25"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26A10E99-3A8C-430A-8FB6-4A55E01A00E0"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5DF84B2-A104-4FA2-8B02-D243D76ACEE7"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B4BA2270-DF93-48FB-A90F-DFBFED05F051"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:1.2.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B4FE0264-95E4-4B75-8904-369035DEA2F1"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "593AA737-5AF3-4F7C-B74B-D3F37701C435"}, {"criteria": "cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "181C8E98-2138-4BFC-B6B0-1DA270AEE7F6"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}