Buffer overflow in the get_msg_text of chan_sip.c in the Session Initiation Protocol (SIP) protocol implementation for Asterisk releases before August 15, 2003, allows remote attackers to execute arbitrary code via certain (1) MESSAGE or (2) INFO requests.
References
| Link | Resource |
|---|---|
| http://www.atstake.com/research/advisories/2003/a090403-1.txt | Exploit Vendor Advisory |
Configurations
Information
Published : 2003-09-16 21:00
Updated : 2008-09-05 13:35
NVD link : CVE-2003-0761
Mitre link : CVE-2003-0761
JSON object : View
CWE
Products Affected
digium
- asterisk


