CVE-2007-5469

OpenSER 1.2.2 does not verify the Digest authentication header URI against the Request URI in SIP messages, which allows remote attackers to use sniffed Digest authentication credentials to call arbitrary telephone numbers or spoof caller ID (aka "toll fraud and authentication forward attack"). NOTE: Debian disputes this issue, stating that "having the two URIs mismatch is allowed by the standard and happens in some setups for valid reasons.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openser:openser:1.2.2:*:*:*:*:*:*:*

History

07 Nov 2023, 02:01

Type Values Removed Values Added
Summary ** DISPUTED ** OpenSER 1.2.2 does not verify the Digest authentication header URI against the Request URI in SIP messages, which allows remote attackers to use sniffed Digest authentication credentials to call arbitrary telephone numbers or spoof caller ID (aka "toll fraud and authentication forward attack"). NOTE: Debian disputes this issue, stating that "having the two URIs mismatch is allowed by the standard and happens in some setups for valid reasons." OpenSER 1.2.2 does not verify the Digest authentication header URI against the Request URI in SIP messages, which allows remote attackers to use sniffed Digest authentication credentials to call arbitrary telephone numbers or spoof caller ID (aka "toll fraud and authentication forward attack"). NOTE: Debian disputes this issue, stating that "having the two URIs mismatch is allowed by the standard and happens in some setups for valid reasons.

Information

Published : 2007-10-16 00:17

Updated : 2024-04-11 00:42


NVD link : CVE-2007-5469

Mitre link : CVE-2007-5469

CVE.ORG link : CVE-2007-5469


JSON object : View

Products Affected

openser

  • openser
CWE
CWE-264

Permissions, Privileges, and Access Controls