Asterisk 1.2.10 supports the use of client-controlled variables to determine filenames in the Record function, which allows remote attackers to (1) execute code via format string specifiers or (2) overwrite files via directory traversals involving unspecified vectors, as demonstrated by the CALLERIDNAME variable.
References
Configurations
History
21 Nov 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
References | () http://labs.musecurity.com/advisories/MU-200608-01.txt - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/22651 - | |
References | () http://securitytracker.com/id?1016742 - Patch | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200610-15.xml - | |
References | () http://www.securityfocus.com/archive/1/444322/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/19683 - Patch | |
References | () http://www.sineapps.com/news.php?rssid=1448 - | |
References | () http://www.vupen.com/english/advisories/2006/3372 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/28544 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/28564 - |
Information
Published : 2006-08-24 20:04
Updated : 2024-11-21 00:15
NVD link : CVE-2006-4346
Mitre link : CVE-2006-4346
CVE.ORG link : CVE-2006-4346
JSON object : View
Products Affected
digium
- asterisk
CWE