Multiple buffer overflows in the switch_perform_substitution function in switch_regex.c in FreeSWITCH 1.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to the index and substituted variables.
References
Link | Resource |
---|---|
http://jira.freeswitch.org/browse/FS-5566 | Exploit Patch |
http://www.openwall.com/lists/oss-security/2013/07/04/4 | Patch |
http://jira.freeswitch.org/browse/FS-5566 | Exploit Patch |
http://www.openwall.com/lists/oss-security/2013/07/04/4 | Patch |
Configurations
History
21 Nov 2024, 01:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://jira.freeswitch.org/browse/FS-5566 - Exploit, Patch | |
References | () http://www.openwall.com/lists/oss-security/2013/07/04/4 - Patch |
Information
Published : 2013-09-30 22:55
Updated : 2024-11-21 01:51
NVD link : CVE-2013-2238
Mitre link : CVE-2013-2238
CVE.ORG link : CVE-2013-2238
JSON object : View
Products Affected
freeswitch
- freeswitch
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer