Описание
Buffer overflow in DNS SRV and NAPTR lookups in Digium Asterisk 15.x before 15.6.2 and 16.x before 16.0.1 allows remote attackers to crash Asterisk via a specially crafted DNS SRV or NAPTR response, because a buffer size is supposed to match an expanded length but actually matches a compressed length.
Ссылки
- PatchVendor Advisory
- ExploitVendor Advisory
- PatchVendor Advisory
- ExploitVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:digium:asterisk:15.0.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:15.0.0:b1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:15.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:15.1.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:15.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:15.1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:15.1.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:15.1.3:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:15.1.4:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:15.1.5:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:15.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:15.2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:15.2.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:15.2.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:15.3.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:15.3.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:15.3.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:15.4.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:15.4.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:15.4.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:15.4.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:15.5.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:15.5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:15.6.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:15.6.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:15.6.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:16.0.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:16.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:16.0.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:16.0.1:rc1:*:*:*:*:*:*
EPSS
Процентиль: 87%
0.03349
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-119
Связанные уязвимости
CVSS3: 7.5
debian
около 7 лет назад
Buffer overflow in DNS SRV and NAPTR lookups in Digium Asterisk 15.x b ...
CVSS3: 7.5
github
больше 3 лет назад
Buffer overflow in DNS SRV and NAPTR lookups in Digium Asterisk 15.x before 15.6.2 and 16.x before 16.0.1 allows remote attackers to crash Asterisk via a specially crafted DNS SRV or NAPTR response, because a buffer size is supposed to match an expanded length but actually matches a compressed length.
EPSS
Процентиль: 87%
0.03349
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-119