Описание
Asterisk Open Source 1.2.26 through 1.2.30.3 and Business Edition B.2.3.5 through B.2.5.5, when realtime IAX2 users are enabled, allows remote attackers to cause a denial of service (crash) via authentication attempts involving (1) an unknown user or (2) a user using hostname matching.
Asterisk Open Source 1.2.26 through 1.2.30.3 and Business Edition B.2.3.5 through B.2.5.5, when realtime IAX2 users are enabled, allows remote attackers to cause a denial of service (crash) via authentication attempts involving (1) an unknown user or (2) a user using hostname matching.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2008-5558
- http://downloads.digium.com/pub/security/AST-2008-012.html
- http://osvdb.org/50675
- http://secunia.com/advisories/32956
- http://secunia.com/advisories/34982
- http://security.gentoo.org/glsa/glsa-200905-01.xml
- http://securityreason.com/securityalert/4769
- http://www.securityfocus.com/archive/1/499117/100/0/threaded
- http://www.securityfocus.com/bid/32773
- http://www.securitytracker.com/id?1021378
- http://www.vupen.com/english/advisories/2008/3403
Связанные уязвимости
Asterisk Open Source 1.2.26 through 1.2.30.3 and Business Edition B.2.3.5 through B.2.5.5, when realtime IAX2 users are enabled, allows remote attackers to cause a denial of service (crash) via authentication attempts involving (1) an unknown user or (2) a user using hostname matching.
Asterisk Open Source 1.2.26 through 1.2.30.3 and Business Edition B.2.3.5 through B.2.5.5, when realtime IAX2 users are enabled, allows remote attackers to cause a denial of service (crash) via authentication attempts involving (1) an unknown user or (2) a user using hostname matching.
Asterisk Open Source 1.2.26 through 1.2.30.3 and Business Edition B.2. ...