Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-92v8-64cc-mmr5

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer overflow in the get_msg_text of chan_sip.c in the Session Initiation Protocol (SIP) protocol implementation for Asterisk releases before August 15, 2003, allows remote attackers to execute arbitrary code via certain (1) MESSAGE or (2) INFO requests.

Buffer overflow in the get_msg_text of chan_sip.c in the Session Initiation Protocol (SIP) protocol implementation for Asterisk releases before August 15, 2003, allows remote attackers to execute arbitrary code via certain (1) MESSAGE or (2) INFO requests.

EPSS

Процентиль: 33%
0.00131
Низкий

Связанные уязвимости

nvd
почти 22 года назад

Buffer overflow in the get_msg_text of chan_sip.c in the Session Initiation Protocol (SIP) protocol implementation for Asterisk releases before August 15, 2003, allows remote attackers to execute arbitrary code via certain (1) MESSAGE or (2) INFO requests.

debian
почти 22 года назад

Buffer overflow in the get_msg_text of chan_sip.c in the Session Initi ...

EPSS

Процентиль: 33%
0.00131
Низкий