Описание
Buffer overflow in the get_msg_text of chan_sip.c in the Session Initiation Protocol (SIP) protocol implementation for Asterisk releases before August 15, 2003, allows remote attackers to execute arbitrary code via certain (1) MESSAGE or (2) INFO requests.
Ссылки
- ExploitVendor Advisory
- ExploitVendor Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:digium:asterisk:1.2.13:*:*:*:*:*:*:*
EPSS
Процентиль: 33%
0.00131
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
debian
почти 22 года назад
Buffer overflow in the get_msg_text of chan_sip.c in the Session Initi ...
github
больше 3 лет назад
Buffer overflow in the get_msg_text of chan_sip.c in the Session Initiation Protocol (SIP) protocol implementation for Asterisk releases before August 15, 2003, allows remote attackers to execute arbitrary code via certain (1) MESSAGE or (2) INFO requests.
EPSS
Процентиль: 33%
0.00131
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other