CVE-2007-4103

7.5 HIGH
Published: July 31, 2007 Modified: April 23, 2026
View on NVD

Description

The IAX2 channel driver (chan_iax2) in Asterisk Open 1.2.x before 1.2.23, 1.4.x before 1.4.9, and Asterisk Appliance Developer Kit before 0.6.0, when configured to allow unauthenticated calls, allows remote attackers to cause a denial of service (resource exhaustion) via a flood of calls that do not complete a 3-way handshake, which causes an ast_channel to be allocated but not released.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://bugs.gentoo.org/show_bug.cgi?id=185713
Source: cve@mitre.org
Issue Tracking Patch
http://ftp.digium.com/pub/asa/ASA-2007-018.pdf
Source: cve@mitre.org
Broken Link Patch
http://osvdb.org/38197
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/26274
Source: cve@mitre.org
Broken Link Patch Vendor Advisory
http://secunia.com/advisories/29051
Source: cve@mitre.org
Broken Link
http://security.gentoo.org/glsa/glsa-200802-11.xml
Source: cve@mitre.org
Third Party Advisory
http://securityreason.com/securityalert/2960
Source: cve@mitre.org
Broken Link
http://www.securityfocus.com/archive/1/475069/100/0/threaded
Source: cve@mitre.org
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/24950
Source: cve@mitre.org
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1018472
Source: cve@mitre.org
Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2007/2701
Source: cve@mitre.org
Broken Link
http://bugs.gentoo.org/show_bug.cgi?id=185713
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Patch
http://ftp.digium.com/pub/asa/ASA-2007-018.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Patch
http://osvdb.org/38197
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/26274
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Patch Vendor Advisory
http://secunia.com/advisories/29051
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://security.gentoo.org/glsa/glsa-200802-11.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://securityreason.com/securityalert/2960
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securityfocus.com/archive/1/475069/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/24950
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1018472
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2007/2701
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link

22 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.5 / 10.0
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

digium