Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Asterisk HTTP Manager Buffer Overflow Vulnerability

Information

Severity

Severity

High

Family

Family

Buffer overflow

CVSSv2 Base

CVSSv2 Base

7.5

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

10 years ago

Modified

Modified

4 years ago

Summary

This host is running Asterisk and is prone to buffer overflow vulnerability.

Insight

Insight

The flaw is due to an error in the 'ast_parse_digest()' function (main/utils.c) in HTTP Manager, which fails to handle 'HTTP Digest Authentication' information sent via a crafted request with an overly long string.

Affected Software

Affected Software

Asterisk version 1.8.x before 1.8.10.1, 10.x before 10.2.1 and 10.3.0

Solution

Solution

Upgrade to Asterisk 1.8.10.1, 10.2.1 or later.

Common Vulnerabilities and Exposures (CVE)