5 results (0.003 seconds)

CVSS: 9.0EPSS: 1%CPEs: 117EXPL: 0

Incomplete blacklist vulnerability in main/manager.c in Asterisk Open Source 1.8.x before 1.8.15.1 and 10.x before 10.7.1, Certified Asterisk 1.8.11 before 1.8.11-cert6, Asterisk Digiumphones 10.x.x-digiumphones before 10.7.1-digiumphones, and Asterisk Business Edition C.3.x before C.3.7.6 allows remote authenticated users to execute arbitrary commands by leveraging originate privileges and providing an ExternalIVR value in an AMI Originate action. Vulnerabilidad de lista negra incompleta en main/manager.c en Asterisk Open Source v1.8.x antes de v1.8.15.1 y v10.x antes de v10.7.1, Certified Asterisk v1.8.11-8.1.11 antes de cert6, Digiumphones Asterisk v10.xx-digiumphones antes de v10.7.1-digiumphones y Asterisk Business Edition C.3.x antes de C.3.7.6 permite a usuarios remotos autenticados ejecutar comandos de su elección aprovechándose de los privilegios de origen y proporcionando un valor ExternalIVR en una acción IAM Originate. • http://downloads.asterisk.org/pub/security/AST-2012-012.html http://secunia.com/advisories/50687 http://secunia.com/advisories/50756 http://www.debian.org/security/2012/dsa-2550 http://www.securitytracker.com/id?1027460 •

CVSS: 4.0EPSS: 96%CPEs: 72EXPL: 0

chan_skinny.c in the Skinny (aka SCCP) channel driver in Certified Asterisk 1.8.11-cert before 1.8.11-cert2 and Asterisk Open Source 1.8.x before 1.8.12.1 and 10.x before 10.4.1 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by closing a connection in off-hook mode. chan_skinny.c en el controlador de canal de Skinny (alias SCCP) en Certified Asterisk 1.8.11-cert antes de v1.8.11-cert2 y Asterisk Open Source v1.8.x antes de v1.8.12.1 y v10.x antes de v10.4.1, permite a usuarios autenticados remotamente provocar una denegación de servicio (eliminar la referencia del puntero NULL y caída demonio) por el cierre de una conexión en el modo de descuelgue. • http://archives.neohapsis.com/archives/bugtraq/2012-05/0145.html http://downloads.asterisk.org/pub/security/AST-2012-008.html http://secunia.com/advisories/49303 http://www.debian.org/security/2012/dsa-2493 http://www.securityfocus.com/bid/53723 http://www.securitytracker.com/id?1027103 https://exchange.xforce.ibmcloud.com/vulnerabilities/75937 • CWE-399: Resource Management Errors •

CVSS: 6.5EPSS: 5%CPEs: 153EXPL: 0

chan_sip.c in the SIP channel driver in Asterisk Open Source 1.8.x before 1.8.11.1 and 10.x before 10.3.1 and Asterisk Business Edition C.3.x before C.3.7.4, when the trustrpid option is enabled, allows remote authenticated users to cause a denial of service (daemon crash) by sending a SIP UPDATE message that triggers a connected-line update attempt without an associated channel. chan_sip.c en el controlador de canal SIP en Asterisk Open Source v1.8.x anterior a v1.8.11.1 y v10.x anterior a v10.3.1 y Asterisk Business Edition C.3.x anterior a C.3.7.4, cuando la opción trustrpid está activada, permite a usuarios remotos autenticados causar una denegación de servicio (caída de la aplicación) mediante el envío de un mensaje de actualización SIP que desencadena un intento de actualización de la línea conectada sin un canal asociado. • http://downloads.asterisk.org/pub/security/AST-2012-006.html http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079759.html http://osvdb.org/81456 http://secunia.com/advisories/48891 http://www.securityfocus.com/bid/53205 http://www.securitytracker.com/id?1026963 https://exchange.xforce.ibmcloud.com/vulnerabilities/75101 https://issues.asterisk.org/jira/browse/ASTERISK-19770 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.5EPSS: 91%CPEs: 153EXPL: 0

main/manager.c in the Manager Interface in Asterisk Open Source 1.6.2.x before 1.6.2.24, 1.8.x before 1.8.11.1, and 10.x before 10.3.1 and Asterisk Business Edition C.3.x before C.3.7.4 does not properly enforce System class authorization requirements, which allows remote authenticated users to execute arbitrary commands via (1) the originate action in the MixMonitor application, (2) the SHELL and EVAL functions in the GetVar manager action, or (3) the SHELL and EVAL functions in the Status manager action. main/manager.c en el Manager Interface en Asterisk Open source v1.6.2.x anterior a v1.6.2.24, v1.8.x anterior a v1.8.11.1, y v10.x anterior a v10.3.1 y Asterisk Business Edition C.3.x anterior a C .3.7.4 no asegura adecuadamente los requisitos de autorización de la clase System, permitiendo a usuarios remotos autenticados ejecutar código arbitrario a través de (1) la acción origen en la aplicación MixMonitor, (2) la SHELL y funciones EVAL en el gestor de acción GetVar, o (3) la SHELL y funciones EVAL en el gestor de acción Status. • http://downloads.asterisk.org/pub/security/AST-2012-004.html http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079759.html http://osvdb.org/81454 http://secunia.com/advisories/48891 http://secunia.com/advisories/48941 http://www.debian.org/security/2012/dsa-2460 http://www.securityfocus.com/bid/53206 http://www.securitytracker.com/id?1026961 https://exchange.xforce.ibmcloud.com/vulnerabilities/75100 • CWE-287: Improper Authentication •

CVSS: 6.5EPSS: 95%CPEs: 153EXPL: 0

Heap-based buffer overflow in chan_skinny.c in the Skinny channel driver in Asterisk Open Source 1.6.2.x before 1.6.2.24, 1.8.x before 1.8.11.1, and 10.x before 10.3.1 allows remote authenticated users to cause a denial of service or possibly have unspecified other impact via a series of KEYPAD_BUTTON_MESSAGE events. Desbordamiento de búfer basado en memoria dinámica en chan_skinny.c en el driver Skinny en Asterisk Open Source v1.6.2.x anterior a v1.6.2.24, v1.8.x anterior a v1.8.11.1, y v10.x anterior a v10.3.1, permite a atacantes remotos causar una denegación de servicio (cuelgue) o tener otro impacto no especificado mediante una serie de eventos KEYPAD_BUTTON_MESSAGE • http://downloads.asterisk.org/pub/security/AST-2012-005.html http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079759.html http://osvdb.org/81455 http://secunia.com/advisories/48891 http://secunia.com/advisories/48941 http://www.debian.org/security/2012/dsa-2460 http://www.securityfocus.com/bid/53210 http://www.securitytracker.com/id?1026962 https://exchange.xforce.ibmcloud.com/vulnerabilities/75102 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •