Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gqh2-528h-q2h8

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in channels/chan_mgcp.c in MGCP in Asterisk 1.0 through 1.2.10 allows remote attackers to execute arbitrary code via a crafted audit endpoint (AUEP) response.

Stack-based buffer overflow in channels/chan_mgcp.c in MGCP in Asterisk 1.0 through 1.2.10 allows remote attackers to execute arbitrary code via a crafted audit endpoint (AUEP) response.

EPSS

Процентиль: 89%
0.05153
Низкий

Связанные уязвимости

ubuntu
около 19 лет назад

Stack-based buffer overflow in channels/chan_mgcp.c in MGCP in Asterisk 1.0 through 1.2.10 allows remote attackers to execute arbitrary code via a crafted audit endpoint (AUEP) response.

nvd
около 19 лет назад

Stack-based buffer overflow in channels/chan_mgcp.c in MGCP in Asterisk 1.0 through 1.2.10 allows remote attackers to execute arbitrary code via a crafted audit endpoint (AUEP) response.

debian
около 19 лет назад

Stack-based buffer overflow in channels/chan_mgcp.c in MGCP in Asteris ...

EPSS

Процентиль: 89%
0.05153
Низкий