Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2003-0761
HistorySep 17, 2003 - 4:00 a.m.

CVE-2003-0761

2003-09-1704:00:00
Debian Security Bug Tracker
security-tracker.debian.org
20
buffer overflow
sip protocol
asterisk
remote attackers
arbitrary code
message
info
unix

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.014

Percentile

86.8%

Buffer overflow in the get_msg_text of chan_sip.c in the Session Initiation Protocol (SIP) protocol implementation for Asterisk releases before August 15, 2003, allows remote attackers to execute arbitrary code via certain (1) MESSAGE or (2) INFO requests.

OSVersionArchitecturePackageVersionFilename
Debian11allasterisk< 0.5.0asterisk_0.5.0_all.deb
Debian999allasterisk< 0.5.0asterisk_0.5.0_all.deb

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.014

Percentile

86.8%

Related for DEBIANCVE:CVE-2003-0761