Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2005-2081

Опубликовано: 05 июл. 2005
Источник: debian
EPSS Низкий

Описание

Stack-based buffer overflow in the function that parses commands in Asterisk 1.0.7, when the 'write = command' option is enabled, allows remote attackers to execute arbitrary code via a command that has two double quotes followed by a tab character.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
asteriskfixed1:1.0.9.dfsg-1package

Примечания

  • Can only be exploited by users who already have the privilege to execute arbitrary commands

EPSS

Процентиль: 57%
0.00347
Низкий

Связанные уязвимости

nvd
больше 20 лет назад

Stack-based buffer overflow in the function that parses commands in Asterisk 1.0.7, when the 'write = command' option is enabled, allows remote attackers to execute arbitrary code via a command that has two double quotes followed by a tab character.

github
почти 4 года назад

Stack-based buffer overflow in the function that parses commands in Asterisk 1.0.7, when the 'write = command' option is enabled, allows remote attackers to execute arbitrary code via a command that has two double quotes followed by a tab character.

EPSS

Процентиль: 57%
0.00347
Низкий