Show filters
171 Total Results
Displaying 91-100 of 171
Sort by:
Attacker Value
Unknown
CVE-2019-13161
Disclosure Date: July 12, 2019 (last updated November 27, 2024)
An issue was discovered in Asterisk Open Source through 13.27.0, 14.x and 15.x through 15.7.2, and 16.x through 16.4.0, and Certified Asterisk through 13.21-cert3. A pointer dereference in chan_sip while handling SDP negotiation allows an attacker to crash Asterisk when handling an SDP answer to an outgoing T.38 re-invite. To exploit this vulnerability an attacker must cause the chan_sip module to send a T.38 re-invite request to them. Upon receipt, the attacker must send an SDP answer containing both a T.38 UDPTL stream and another media stream containing only a codec (which is not permitted according to the chan_sip configuration).
0
Attacker Value
Unknown
CVE-2019-12827
Disclosure Date: July 12, 2019 (last updated November 27, 2024)
Buffer overflow in res_pjsip_messaging in Digium Asterisk versions 13.21-cert3, 13.27.0, 15.7.2, 16.4.0 and earlier allows remote authenticated users to crash Asterisk by sending a specially crafted SIP MESSAGE message.
0
Attacker Value
Unknown
CVE-2019-18976
Disclosure Date: June 20, 2019 (last updated November 27, 2024)
An issue was discovered in res_pjsip_t38.c in Sangoma Asterisk through 13.x and Certified Asterisk through 13.21-x. If it receives a re-invite initiating T.38 faxing and has a port of 0 and no c line in the SDP, a NULL pointer dereference and crash will occur. This is different from CVE-2019-18940.
0
Attacker Value
Unknown
CVE-2018-17281
Disclosure Date: September 24, 2018 (last updated November 27, 2024)
There is a stack consumption vulnerability in the res_http_websocket.so module of Asterisk through 13.23.0, 14.7.x through 14.7.7, and 15.x through 15.6.0 and Certified Asterisk through 13.21-cert2. It allows an attacker to crash Asterisk via a specially crafted HTTP request to upgrade the connection to a websocket.
0
Attacker Value
Unknown
CVE-2018-10864
Disclosure Date: August 13, 2018 (last updated November 27, 2024)
An uncontrolled resource consumption flaw has been discovered in redhat-certification in the way documents are loaded. A remote attacker may provide an existing but invalid XML file which would be opened and never closed, possibly producing a Denial of Service.
0
Attacker Value
Unknown
CVE-2017-7509
Disclosure Date: July 26, 2018 (last updated November 27, 2024)
An input validation error was found in Red Hat Certificate System's handling of client provided certificates before 8.1.20-1. If the certreq field is not present in a certificate an assertion error is triggered causing a denial of service.
0
Attacker Value
Unknown
CVE-2018-10870
Disclosure Date: July 19, 2018 (last updated November 27, 2024)
redhat-certification does not properly sanitize paths in rhcertStore.py:__saveResultsFile. A remote attacker could use this flaw to overwrite any file, potentially gaining remote code execution.
0
Attacker Value
Unknown
CVE-2018-10869
Disclosure Date: July 19, 2018 (last updated November 27, 2024)
redhat-certification does not properly restrict files that can be download through the /download page. A remote attacker may download any file accessible by the user running httpd.
0
Attacker Value
Unknown
RSA Certificate Manager Path Traversal Vulnerability
Disclosure Date: July 03, 2018 (last updated November 27, 2024)
RSA Certificate Manager Versions 6.9 build 560 through 6.9 build 564 contain a path traversal vulnerability in the RSA CMP Enroll Server and the RSA REST Enroll Server. A remote unauthenticated attacker could potentially exploit this vulnerability by manipulating input parameters of the application to gain unauthorized read access to the files stored on the server filesystem, with the privileges of the running web application.
0
Attacker Value
Unknown
CVE-2018-12227
Disclosure Date: June 12, 2018 (last updated November 26, 2024)
An issue was discovered in Asterisk Open Source 13.x before 13.21.1, 14.x before 14.7.7, and 15.x before 15.4.1 and Certified Asterisk 13.18-cert before 13.18-cert4 and 13.21-cert before 13.21-cert2. When endpoint specific ACL rules block a SIP request, they respond with a 403 forbidden. However, if an endpoint is not identified, then a 401 unauthorized response is sent. This vulnerability just discloses which requests hit a defined endpoint. The ACL rules cannot be bypassed to gain access to the disclosed endpoints.
0