Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-17281

Опубликовано: 24 сент. 2018
Источник: debian
EPSS Высокий

Описание

There is a stack consumption vulnerability in the res_http_websocket.so module of Asterisk through 13.23.0, 14.7.x through 14.7.7, and 15.x through 15.6.0 and Certified Asterisk through 13.21-cert2. It allows an attacker to crash Asterisk via a specially crafted HTTP request to upgrade the connection to a websocket.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
asteriskfixed1:13.23.1~dfsg-1package

Примечания

  • https://downloads.asterisk.org/pub/security/AST-2018-009.html

  • :https://issues.asterisk.org/jira/browse/ASTERISK-28013

EPSS

Процентиль: 99%
0.80258
Высокий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 7 лет назад

There is a stack consumption vulnerability in the res_http_websocket.so module of Asterisk through 13.23.0, 14.7.x through 14.7.7, and 15.x through 15.6.0 and Certified Asterisk through 13.21-cert2. It allows an attacker to crash Asterisk via a specially crafted HTTP request to upgrade the connection to a websocket.

CVSS3: 7.5
nvd
больше 7 лет назад

There is a stack consumption vulnerability in the res_http_websocket.so module of Asterisk through 13.23.0, 14.7.x through 14.7.7, and 15.x through 15.6.0 and Certified Asterisk through 13.21-cert2. It allows an attacker to crash Asterisk via a specially crafted HTTP request to upgrade the connection to a websocket.

CVSS3: 7.5
github
больше 3 лет назад

There is a stack consumption vulnerability in the res_http_websocket.so module of Asterisk through 13.23.0, 14.7.x through 14.7.7, and 15.x through 15.6.0 and Certified Asterisk through 13.21-cert2. It allows an attacker to crash Asterisk via a specially crafted HTTP request to upgrade the connection to a websocket.

EPSS

Процентиль: 99%
0.80258
Высокий