Asterisk 1.2.10 supports the use of client-controlled variables to determine filenames in the Record function, which allows remote attackers to (1) execute code via format string specifiers or (2) overwrite files via directory traversals involving unspecified vectors, as demonstrated by the CALLERIDNAME variable.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/28544 | vdb entry |
http://www.vupen.com/english/advisories/2006/3372 | vdb entry |
http://www.gentoo.org/security/en/glsa/glsa-200610-15.xml | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/28564 | vdb entry |
http://labs.musecurity.com/advisories/MU-200608-01.txt | patch vendor advisory |
http://secunia.com/advisories/22651 | third party advisory |
http://www.securityfocus.com/bid/19683 | patch vdb entry |
http://securitytracker.com/id?1016742 | patch vdb entry |
http://www.securityfocus.com/archive/1/444322/100/0/threaded | mailing list |
http://www.sineapps.com/news.php?rssid=1448 |