1 results (0.002 seconds)

CVSS: 5.0EPSS: 8%CPEs: 16EXPL: 0

The ooh323 channel driver in Asterisk Addons 1.2.x before 1.2.9 and Asterisk-Addons 1.4.x before 1.4.7 creates a remotely accessible TCP port that is intended solely for localhost communication, and interprets some TCP application-data fields as addresses of memory to free, which allows remote attackers to cause a denial of service (daemon crash) via crafted TCP packets. El controlador de canal ooh323 channel en Asterisk Addons 1.2.x anteriores a 1.2.9 y Asterisk-Addons 1.4.x anteriores a 1.4.7 crea un puerto TCP accesible remotamente previsto únicamente para comunicaciones localhost, e interpreta algunos campos application-data como direcciones de memoria para liberar, lo que permite a atacantes remotos provocar una denegación de servicio (caída de demonio) mediante paquetes TCP manipulados. • http://downloads.digium.com/pub/security/AST-2008-009.html http://secunia.com/advisories/30555 http://securitytracker.com/id?1020202 http://www.securityfocus.com/archive/1/493122/100/0/threaded http://www.securityfocus.com/archive/1/493144/100/0/threaded http://www.securityfocus.com/bid/29567 http://www.vupen.com/english/advisories/2008/1747/references https://exchange.xforce.ibmcloud.com/vulnerabilities/42869 • CWE-399: Resource Management Errors •