Описание
Asterisk 1.2.10 supports the use of client-controlled variables to determine filenames in the Record function, which allows remote attackers to (1) execute code via format string specifiers or (2) overwrite files via directory traversals involving unspecified vectors, as demonstrated by the CALLERIDNAME variable.
Релиз | Статус | Примечание |
---|---|---|
dapper | ignored | end of life |
devel | released | 1.4.11~dfsg-1 |
edgy | released | 1.2.12.1.dfsg-1ubuntu1.4 |
feisty | released | 1.2.16~dfsg-1ubuntu3.1 |
gutsy | released | 1.4.11~dfsg-1 |
hardy | released | 1.4.11~dfsg-1 |
intrepid | released | 1.4.11~dfsg-1 |
jaunty | released | 1.4.11~dfsg-1 |
karmic | released | 1.4.11~dfsg-1 |
upstream | needs-triage |
Показывать по
Ссылки на источники
EPSS
7.5 High
CVSS2
Связанные уязвимости
Asterisk 1.2.10 supports the use of client-controlled variables to determine filenames in the Record function, which allows remote attackers to (1) execute code via format string specifiers or (2) overwrite files via directory traversals involving unspecified vectors, as demonstrated by the CALLERIDNAME variable.
Asterisk 1.2.10 supports the use of client-controlled variables to det ...
Asterisk 1.2.10 supports the use of client-controlled variables to determine filenames in the Record function, which allows remote attackers to (1) execute code via format string specifiers or (2) overwrite files via directory traversals involving unspecified vectors, as demonstrated by the CALLERIDNAME variable.
EPSS
7.5 High
CVSS2