Computer Security
[EN] no-pyccku

Asterisk multiple security vulnerabilities
updated since 19.03.2008
SecurityVulns ID:8802
Threat Level:
Description:Multiple format string vulnerabilities, buffer overflow on RTP handling, HTTP interface sessions spoofing, unauthorized SIP calls.
Affected:ASTERISK : Asterisk 1.6
CVE:CVE-2008-1390 (The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses.)
Original documentdocumentnoreply_(at), [Full-disclosure] [MU-200803-01] Multiple buffer overflows in Asterisk (21.03.2008)
 documentASTERISK, AST-2008-004: Format String Vulnerability in Logger and Manager (19.03.2008)
 documentASTERISK, AST-2008-002: Two buffer overflows in RTP Codec Payload Handling (19.03.2008)
 documentASTERISK, AST-2008-003: Unauthenticated calls allowed from SIP channel driver (19.03.2008)
 documentASTERISK, AST-2008-005: HTTP Manager ID is predictable (19.03.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod