Page 2 of 8 results (0.010 seconds)

CVSS: 6.5EPSS: 95%CPEs: 153EXPL: 0

Heap-based buffer overflow in chan_skinny.c in the Skinny channel driver in Asterisk Open Source 1.6.2.x before 1.6.2.24, 1.8.x before 1.8.11.1, and 10.x before 10.3.1 allows remote authenticated users to cause a denial of service or possibly have unspecified other impact via a series of KEYPAD_BUTTON_MESSAGE events. Desbordamiento de búfer basado en memoria dinámica en chan_skinny.c en el driver Skinny en Asterisk Open Source v1.6.2.x anterior a v1.6.2.24, v1.8.x anterior a v1.8.11.1, y v10.x anterior a v10.3.1, permite a atacantes remotos causar una denegación de servicio (cuelgue) o tener otro impacto no especificado mediante una serie de eventos KEYPAD_BUTTON_MESSAGE • http://downloads.asterisk.org/pub/security/AST-2012-005.html http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079759.html http://osvdb.org/81455 http://secunia.com/advisories/48891 http://secunia.com/advisories/48941 http://www.debian.org/security/2012/dsa-2460 http://www.securityfocus.com/bid/53210 http://www.securitytracker.com/id?1026962 https://exchange.xforce.ibmcloud.com/vulnerabilities/75102 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.5EPSS: 91%CPEs: 153EXPL: 0

main/manager.c in the Manager Interface in Asterisk Open Source 1.6.2.x before 1.6.2.24, 1.8.x before 1.8.11.1, and 10.x before 10.3.1 and Asterisk Business Edition C.3.x before C.3.7.4 does not properly enforce System class authorization requirements, which allows remote authenticated users to execute arbitrary commands via (1) the originate action in the MixMonitor application, (2) the SHELL and EVAL functions in the GetVar manager action, or (3) the SHELL and EVAL functions in the Status manager action. main/manager.c en el Manager Interface en Asterisk Open source v1.6.2.x anterior a v1.6.2.24, v1.8.x anterior a v1.8.11.1, y v10.x anterior a v10.3.1 y Asterisk Business Edition C.3.x anterior a C .3.7.4 no asegura adecuadamente los requisitos de autorización de la clase System, permitiendo a usuarios remotos autenticados ejecutar código arbitrario a través de (1) la acción origen en la aplicación MixMonitor, (2) la SHELL y funciones EVAL en el gestor de acción GetVar, o (3) la SHELL y funciones EVAL en el gestor de acción Status. • http://downloads.asterisk.org/pub/security/AST-2012-004.html http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079759.html http://osvdb.org/81454 http://secunia.com/advisories/48891 http://secunia.com/advisories/48941 http://www.debian.org/security/2012/dsa-2460 http://www.securityfocus.com/bid/53206 http://www.securitytracker.com/id?1026961 https://exchange.xforce.ibmcloud.com/vulnerabilities/75100 • CWE-287: Improper Authentication •

CVSS: 4.3EPSS: 1%CPEs: 59EXPL: 1

chan_sip.c in Asterisk Open Source 1.8.x before 1.8.8.2 and 10.x before 10.0.1, when the res_srtp module is used and media support is improperly configured, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted SDP message with a crypto attribute and a (1) video or (2) text media type, as demonstrated by CSipSimple. chan_sip.c en Asterisk Open Source v1.8.x antes de v1.8.8.2 y v10.x antes de v10.0.1 , cuando se usa el módulo res_srtp y el soporte multimedia esta incorrectamente configurado, permite a atacantes remotos provocar una denegación de servicio (puntero a NULL y caída del demonio) a través de un mensaje SDP específicamente modificado con un atributo de cifrado y (1) un vídeo o (2) el tipo de medio 'text'. Esto queda demostrado con CSipSimple. • http://downloads.asterisk.org/pub/security/AST-2012-001-1.8.diff http://downloads.asterisk.org/pub/security/AST-2012-001-10.diff http://downloads.asterisk.org/pub/security/AST-2012-001.html http://www.openwall.com/lists/oss-security/2012/01/20/16 http://www.openwall.com/lists/oss-security/2012/01/20/18 https://bugzilla.redhat.com/show_bug.cgi?id=783487 https://issues.asterisk.org/jira/browse/ASTERISK-19202 https://issues.asterisk.org/jira/secure/attachment/42202/iss •