Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2006-4346

Опубликовано: 24 авг. 2006
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5

Описание

Asterisk 1.2.10 supports the use of client-controlled variables to determine filenames in the Record function, which allows remote attackers to (1) execute code via format string specifiers or (2) overwrite files via directory traversals involving unspecified vectors, as demonstrated by the CALLERIDNAME variable.

РелизСтатусПримечание
dapper

ignored

end of life
devel

released

1.4.11~dfsg-1
edgy

released

1.2.12.1.dfsg-1ubuntu1.4
feisty

released

1.2.16~dfsg-1ubuntu3.1
gutsy

released

1.4.11~dfsg-1
hardy

released

1.4.11~dfsg-1
intrepid

released

1.4.11~dfsg-1
jaunty

released

1.4.11~dfsg-1
karmic

released

1.4.11~dfsg-1
upstream

needs-triage

Показывать по

Ссылки на источники

EPSS

Процентиль: 84%
0.02329
Низкий

7.5 High

CVSS2

Связанные уязвимости

nvd
около 19 лет назад

Asterisk 1.2.10 supports the use of client-controlled variables to determine filenames in the Record function, which allows remote attackers to (1) execute code via format string specifiers or (2) overwrite files via directory traversals involving unspecified vectors, as demonstrated by the CALLERIDNAME variable.

debian
около 19 лет назад

Asterisk 1.2.10 supports the use of client-controlled variables to det ...

github
больше 3 лет назад

Asterisk 1.2.10 supports the use of client-controlled variables to determine filenames in the Record function, which allows remote attackers to (1) execute code via format string specifiers or (2) overwrite files via directory traversals involving unspecified vectors, as demonstrated by the CALLERIDNAME variable.

EPSS

Процентиль: 84%
0.02329
Низкий

7.5 High

CVSS2