FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-04-23 14:57:51 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
0d530174-6eef-11e1-afd6-14dae9ebcf89asterisk -- multiple vulnerabilities

Asterisk project reports:

Stack Buffer Overflow in HTTP Manager

Remote Crash Vulnerability in Milliwatt Application


Discovery 2012-03-15
Entry 2012-03-15
asterisk14
gt 1.4.* lt 1.4.44

asterisk16
gt 1.6.* lt 1.6.2.23

asterisk18
gt 1.8.* lt 1.8.10.1

asterisk10
gt 10.* lt 10.2.1

http://downloads.asterisk.org/pub/security/AST-2012-002.html
http://downloads.asterisk.org/pub/security/AST-2012-003.html
3c7d565a-6c64-11e0-813a-6c626dd55a41Asterisk -- multiple vulnerabilities

The Asterisk Development Team reports:

It is possible for a user of the Asterisk Manager Interface to bypass a security check and execute shell commands when they should not have that ability. Sending the "Async" header with the "Application" header during an Originate action, allows authenticated manager users to execute shell commands. Only users with the "system" privilege should be able to do this.

On systems that have the Asterisk Manager Interface, Skinny, SIP over TCP, or the built in HTTP server enabled, it is possible for an attacker to open as many connections to asterisk as he wishes. This will cause Asterisk to run out of available file descriptors and stop processing any new calls. Additionally, disk space can be exhausted as Asterisk logs failures to open new file descriptors.


Discovery 2011-04-21
Entry 2011-04-21
asterisk14
gt 1.4.* lt 1.4.40.1

asterisk16
gt 1.6.* lt 1.6.2.17.3

asterisk18
gt 1.8.* lt 1.8.3.3

CVE-2011-1507
http://downloads.asterisk.org/pub/security/AST-2011-005.pdf
http://downloads.asterisk.org/pub/security/AST-2011-006.pdf
40544e8c-9f7b-11e0-9bec-6c626dd55a41Asterisk -- multiple vulnerabilities

The Asterisk Development Team reports:

AST-2011-008: If a remote user sends a SIP packet containing a NULL, Asterisk assumes available data extends past the null to the end of the packet when the buffer is actually truncated when copied. This causes SIP header parsing to modify data past the end of the buffer altering unrelated memory structures. This vulnerability does not affect TCP/TLS connections.

AST-2011-009: A remote user sending a SIP packet containing a Contact header with a missing left angle bracket causes Asterisk to access a null pointer.

AST-2011-010: A memory address was inadvertently transmitted over the network via IAX2 via an option control frame and the remote party would try to access it.

Possible enumeration of SIP users due to differing authentication responses.


Discovery 2011-06-24
Entry 2011-06-25
Modified 2011-06-29
asterisk14
gt 1.4.* lt 1.4.41.2

asterisk16
gt 1.6.* lt 1.6.2.18.2

asterisk18
gt 1.8.* lt 1.8.4.4

CVE-2011-2529
CVE-2011-2535
CVE-2011-2536
http://downloads.asterisk.org/pub/security/AST-2011-008.html
http://downloads.asterisk.org/pub/security/AST-2011-009.html
http://downloads.asterisk.org/pub/security/AST-2011-010.html
http://downloads.asterisk.org/pub/security/AST-2011-011.html
5ab9fb2a-23a5-11e0-a835-0003ba02bf30asterisk -- Exploitable Stack Buffer Overflow

The Asterisk Development Team reports:

The releases of Asterisk 1.4.38.1, 1.4.39.1, 1.6.1.21, 1.6.2.15.1, 1.6.2.16.2, 1.8.1.2, and 1.8.2.1 resolve an issue when forming an outgoing SIP request while in pedantic mode, which can cause a stack buffer to be made to overflow if supplied with carefully crafted caller ID information. The issue and resolution are described in the AST-2011-001 security advisory.


Discovery 2011-01-18
Entry 2011-01-19
asterisk14
gt 1.4.* lt 1.4.39.1

asterisk16
gt 1.6.* lt 1.6.2.16.1

asterisk18
gt 1.8.* lt 1.8.2.2

http://downloads.asterisk.org/pub/security/AST-2011-001.pdf
65d16342-3ec8-11e0-9df7-001c42d23634asterisk -- Exploitable Stack and Heap Array Overflows

The Asterisk Development Team reports:

The releases of Asterisk 1.4.39.2, 1.6.1.22, 1.6.2.16.2, and 1.8.2.4 resolve an issue that when decoding UDPTL packets, multiple heap based arrays can be made to overflow by specially crafted packets. Systems configured for T.38 pass through or termination are vulnerable. The issue and resolution are described in the AST-2011-002 security advisory.


Discovery 2011-02-21
Entry 2011-02-22
asterisk14
gt 1.4.* lt 1.4.39.2

asterisk16
gt 1.6.* lt 1.6.2.16.2

asterisk18
gt 1.8.* lt 1.8.2.4

http://downloads.asterisk.org/pub/security/AST-2011-002.html
http://secunia.com/advisories/43429/