Search for vulnerabilities
Vulnerability ID | VCID-y24y-f1ah-aaar |
Aliases |
CVE-2007-3764
|
Summary | The Skinny channel driver (chan_skinny) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a certain data length value in a crafted packet, which results in an "overly large memcpy." |
Status | Published |
Exploitability | 2.0 |
Weighted Severity | 0.9 |
Risk | 1.8 |
Affected and Fixed Packages | Package Details |
There are no known CWE. |
Reference id | Reference type | URL |
---|---|---|
https://api.first.org/data/v1/epss?cve=CVE-2007-3764 | ||
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3764 | ||
CVE-2007-3764 | Exploit | https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/4196.c |
GLSA-200802-11 | https://security.gentoo.org/glsa/200802-11 |
Data source | Exploit-DB |
---|---|
Date added | July 17, 2007 |
Description | Asterisk < 1.2.22/1.4.8/2.2.1 - 'chan_skinny' Remote Denial of Service |
Ransomware campaign use | Known |
Source publication date | July 18, 2007 |
Exploit type | dos |
Platform | multiple |
Source update date | Oct. 5, 2016 |
Percentile | 0.96279 |
EPSS Score | 0.4336 |
Published At | March 29, 2025, 12:55 p.m. |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
There are no relevant records. |