Описание
registry.pl in Fonality Trixbox 2.0 PBX products, when running in certain environments, reads and executes a set of commands from a remote web site without sufficiently validating the origin of the commands, which allows remote attackers to disable trixbox and execute arbitrary commands via a DNS spoofing attack.
registry.pl in Fonality Trixbox 2.0 PBX products, when running in certain environments, reads and executes a set of commands from a remote web site without sufficiently validating the origin of the commands, which allows remote attackers to disable trixbox and execute arbitrary commands via a DNS spoofing attack.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2007-6424
- http://osvdb.org/44136
- http://voipsa.org/blog/2007/12/17/trixbox-contains-phone-home-code-to-retrieve-arbitrary-commands-to-execute
- http://voipsa.org/pipermail/voipsec_voipsa.org/2007-December/002522.html
- http://voipsa.org/pipermail/voipsec_voipsa.org/2007-December/002528.html
- http://voipsa.org/pipermail/voipsec_voipsa.org/2007-December/002533.html
- http://www.superunknown.org/pivot/entry.php?id=15
- http://www.trixbox.org/forums/trixbox-forums/open-discussion/trixbox-phones-home
EPSS
CVE ID
Связанные уязвимости
registry.pl in Fonality Trixbox 2.0 PBX products, when running in certain environments, reads and executes a set of commands from a remote web site without sufficiently validating the origin of the commands, which allows remote attackers to disable trixbox and execute arbitrary commands via a DNS spoofing attack.
EPSS