CVE-2007-3763

Asterisk < 1.2.22 and 1.4.x < 1.4.8 - Denial of Service via Crafted IAX2 LAGRQ or LAGRP Frame

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2007-3763. PoCs published by tenkei_ev.

AI-analyzed exploit summary This Ruby script exploits CVE-2007-3763, a DoS vulnerability in Asterisk's IAX2 channel driver. It sends malformed IAX2 control packets with subtypes 0x0b or 0x0c to crash unpatched servers by triggering a null pointer dereference.

Description

The IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted (1) LAGRQ or (2) LAGRP frame that contains information elements of IAX frames, which results in a NULL pointer dereference when Asterisk does not properly set an associated variable.

Exploits (1)

exploitdb WORKING POC VERIFIED
by tenkei_ev · rubydosmultiple
https://www.exploit-db.com/exploits/4249

This Ruby script exploits CVE-2007-3763, a DoS vulnerability in Asterisk's IAX2 channel driver. It sends malformed IAX2 control packets with subtypes 0x0b or 0x0c to crash unpatched servers by triggering a null pointer dereference.

Classification
Working Poc 95%
Attack Type
Dos
Complexity
Moderate
Reliability
Reliable
Target: Asterisk (versions prior to the fix for ASA-2007-015)
No auth needed
Prerequisites: Network access to the target's IAX2 port (UDP 4569) · Unpatched Asterisk server
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (10)

Core 10
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/24950
Patch, Vendor Advisory x_refsource_confirm
http://ftp.digium.com/pub/asa/ASA-2007-015.pdf
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/26099
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id?1018407
Third Party Advisory vendor-advisory x_refsource_gentoo
http://security.gentoo.org/glsa/glsa-200802-11.xml
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/29051
Issue Tracking x_refsource_confirm
http://bugs.gentoo.org/show_bug.cgi?id=185713
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2007/2563
Third Party Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2007/dsa-1358
Vendor Advisory vendor-advisory x_refsource_suse
http://www.novell.com/linux/security/advisories/2007_15_sr.html

Scores

EPSS 0.2518
EPSS Percentile 96.3%

Details

Status published
Products (36)
asterisk/asterisk 1.0
asterisk/asterisk 1.0.6
asterisk/asterisk 1.0.7
asterisk/asterisk 1.0.8
asterisk/asterisk 1.0.9
asterisk/asterisk 1.0.10
asterisk/asterisk 1.0.11
asterisk/asterisk 1.0.12
asterisk/asterisk 1.2.0_beta1
asterisk/asterisk 1.2.0_beta2
... and 26 more
Published Jul 18, 2007
Tracked Since Feb 18, 2026