Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jcwq-q3x2-6prq

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The SIP channel module in Yet Another Telephony Engine (Yate) before 1.2.0 sets the caller_info_uri parameter using an incorrect variable that can be NULL, which allows remote attackers to cause a denial of service (NULL dereference and application crash) via a Call-Info header without a purpose parameter.

The SIP channel module in Yet Another Telephony Engine (Yate) before 1.2.0 sets the caller_info_uri parameter using an incorrect variable that can be NULL, which allows remote attackers to cause a denial of service (NULL dereference and application crash) via a Call-Info header without a purpose parameter.

EPSS

Процентиль: 81%
0.01439
Низкий

Дефекты

CWE-20

Связанные уязвимости

ubuntu
почти 19 лет назад

The SIP channel module in Yet Another Telephony Engine (Yate) before 1.2.0 sets the caller_info_uri parameter using an incorrect variable that can be NULL, which allows remote attackers to cause a denial of service (NULL dereference and application crash) via a Call-Info header without a purpose parameter.

nvd
почти 19 лет назад

The SIP channel module in Yet Another Telephony Engine (Yate) before 1.2.0 sets the caller_info_uri parameter using an incorrect variable that can be NULL, which allows remote attackers to cause a denial of service (NULL dereference and application crash) via a Call-Info header without a purpose parameter.

debian
почти 19 лет назад

The SIP channel module in Yet Another Telephony Engine (Yate) before 1 ...

EPSS

Процентиль: 81%
0.01439
Низкий

Дефекты

CWE-20