Описание
There is a stack consumption vulnerability in the res_http_websocket.so module of Asterisk through 13.23.0, 14.7.x through 14.7.7, and 15.x through 15.6.0 and Certified Asterisk through 13.21-cert2. It allows an attacker to crash Asterisk via a specially crafted HTTP request to upgrade the connection to a websocket.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support, was needed |
| cosmic | ignored | end of life |
| devel | not-affected | 1:16.2.1~dfsg-1 |
| disco | not-affected | 1:16.2.1~dfsg-1 |
| eoan | not-affected | 1:16.2.1~dfsg-1 |
| esm-apps/bionic | needed | |
| esm-apps/focal | not-affected | 1:16.2.1~dfsg-1 |
| esm-apps/jammy | not-affected | 1:16.2.1~dfsg-1 |
| esm-apps/noble | not-affected | 1:16.2.1~dfsg-1 |
| esm-apps/xenial | needed |
Показывать по
Ссылки на источники
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
There is a stack consumption vulnerability in the res_http_websocket.so module of Asterisk through 13.23.0, 14.7.x through 14.7.7, and 15.x through 15.6.0 and Certified Asterisk through 13.21-cert2. It allows an attacker to crash Asterisk via a specially crafted HTTP request to upgrade the connection to a websocket.
There is a stack consumption vulnerability in the res_http_websocket.s ...
There is a stack consumption vulnerability in the res_http_websocket.so module of Asterisk through 13.23.0, 14.7.x through 14.7.7, and 15.x through 15.6.0 and Certified Asterisk through 13.21-cert2. It allows an attacker to crash Asterisk via a specially crafted HTTP request to upgrade the connection to a websocket.
5 Medium
CVSS2
7.5 High
CVSS3