Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Gentoo Security Advisory GLSA 200606-15 (asterisk)
Information
Severity
Severity
High
Family
Family
Gentoo Local Security Checks
CVSSv2 Base
CVSSv2 Base
7.5
CVSSv2 Vector
CVSSv2 Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
Solution Type
Solution Type
Vendor Patch
Created
Created
15 years ago
Modified
Modified
6 years ago
Summary
The remote host is missing updates announced in advisory GLSA 200606-15.
Insight
Insight
Asterisk contains a bug in the IAX2 channel driver making it vulnerable to the remote execution of arbitrary code.
Solution
Solution
All Asterisk users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose '>=net-misc/asterisk-1.0.11_p1' http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200606-15 http://bugs.gentoo.org/show_bug.cgi?id=135680 http://www.coresecurity.com/common/showdoc.php?idx=547&idxseccion=10