Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jcwq-q3x2-6prq

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The SIP channel module in Yet Another Telephony Engine (Yate) before 1.2.0 sets the caller_info_uri parameter using an incorrect variable that can be NULL, which allows remote attackers to cause a denial of service (NULL dereference and application crash) via a Call-Info header without a purpose parameter.

The SIP channel module in Yet Another Telephony Engine (Yate) before 1.2.0 sets the caller_info_uri parameter using an incorrect variable that can be NULL, which allows remote attackers to cause a denial of service (NULL dereference and application crash) via a Call-Info header without a purpose parameter.

EPSS

Процентиль: 79%
0.01297
Низкий

Дефекты

CWE-20

Связанные уязвимости

ubuntu
больше 18 лет назад

The SIP channel module in Yet Another Telephony Engine (Yate) before 1.2.0 sets the caller_info_uri parameter using an incorrect variable that can be NULL, which allows remote attackers to cause a denial of service (NULL dereference and application crash) via a Call-Info header without a purpose parameter.

nvd
больше 18 лет назад

The SIP channel module in Yet Another Telephony Engine (Yate) before 1.2.0 sets the caller_info_uri parameter using an incorrect variable that can be NULL, which allows remote attackers to cause a denial of service (NULL dereference and application crash) via a Call-Info header without a purpose parameter.

debian
больше 18 лет назад

The SIP channel module in Yet Another Telephony Engine (Yate) before 1 ...

EPSS

Процентиль: 79%
0.01297
Низкий

Дефекты

CWE-20