diff options
author | zi <zi@FreeBSD.org> | 2011-12-09 09:52:42 +0800 |
---|---|---|
committer | zi <zi@FreeBSD.org> | 2011-12-09 09:52:42 +0800 |
commit | cb65238d6c9eff2a3d8e02230971ce6d415247f7 (patch) | |
tree | bd30648283d71b027f4e56b3951e27f8425ea99d /security | |
parent | a55cc7b4836e9a6832243ddb7c32e0555fe6b33b (diff) | |
download | freebsd-ports-gnome-cb65238d6c9eff2a3d8e02230971ce6d415247f7.tar.gz freebsd-ports-gnome-cb65238d6c9eff2a3d8e02230971ce6d415247f7.tar.zst freebsd-ports-gnome-cb65238d6c9eff2a3d8e02230971ce6d415247f7.zip |
- Document asterisk vulnerabilities
Feature safe: yes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 37 |
1 files changed, 37 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 91d7afe9fdeb..3b5f90d2e0fb 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -47,6 +47,43 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="bb389137-21fb-11e1-89b4-001ec9578670"> + <topic>asterisk -- Multiple Vulnerabilities</topic> + <affects> + <package> + <name>asterisk</name> + <range><lt>1.8.7.2</lt></range> + </package> + <package> + <name>asterisk16</name> + <range><lt>1.6.2.21</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Asterisk project reports:</p> + <blockquote cite="http://downloads.asterisk.org/pub/security/AST-2011-013.html"> + <p>It is possible to enumerate SIP usernames when the general and user/peer + NAT settings differ in whether to respond to the port a request is sent + from or the port listed for responses in the Via header</p> + </blockquote> + <blockquote cite="http://downloads.asterisk.org/pub/security/AST-2011-014.html"> + <p>When the "automon" feature is enabled in features.conf, it is possible to + send a sequence of SIP requests that cause Asterisk to dereference a NULL + pointer and crash.</p> + </blockquote> + </body> + </description> + <references> + <url>http://downloads.asterisk.org/pub/security/AST-2011-013.html</url> + <url>http://downloads.asterisk.org/pub/security/AST-2011-014.html</url> + </references> + <dates> + <discovery>2011-12-08</discovery> + <entry>2011-12-09</entry> + </dates> + </vuln> + <vuln vid="93be487e-211f-11e1-89b4-001ec9578670"> <topic>isc-dhcp-server -- Remote DoS</topic> <affects> |