Asterisk Multiple Remote Vulnerabilities

Asterisk is prone to remote buffer-overflow, format-string, and directory-traversal vulnerabilities. These issues arise because the application fails to properly bounds-check and sanitize user-supplied input before copying it to an insufficiently sized memory buffer.

Exploiting these vulnerabilities allows remote attackers to execute arbitrary machine code in the context of the affected application. Failed exploit attempts will likely crash the server, denying further service to legitimate users.


 

Privacy Statement
Copyright 2010, SecurityFocus