Computer Security
[EN] securityvulns.ru no-pyccku


djbdns records poisoning
Published:11.03.2009
Source:
SecurityVulns ID:9728
Type:remote
Threat Level:
5/10
Description:Ivalid processing of compressed response allows to inject additional NS records.
Affected:DJBDNS : djbdns 1.05
Original documentdocumentMatthew Dempsky, djbdns misformats some long response packets; patch and example attack (11.03.2009)

Asterisk VoIP server DoS
Published:11.03.2009
Source:
SecurityVulns ID:9729
Type:remote
Threat Level:
5/10
Description:NULL pointer dereference on empty SIP INVITE header.
Affected:DIGIUM : Asterisk 1.4
 ASTERISK : Asterisk 1.6
Original documentdocumentASTERISK, AST-2009-002: Remote Crash Vulnerability in SIP channel driver (11.03.2009)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod