[asterisk-bugs] [JIRA] (ASTERISK-30103) chan_ooh323 Vulnerability in calling/called party IE

Asterisk Team (JIRA) noreply at issues.asterisk.org
Thu Dec 15 07:04:03 CST 2022


     [ https://issues.asterisk.org/jira/browse/ASTERISK-30103?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Asterisk Team updated ASTERISK-30103:
-------------------------------------

    Target Release Version/s: 18.16.0

> chan_ooh323 Vulnerability in calling/called party IE
> ----------------------------------------------------
>
>                 Key: ASTERISK-30103
>                 URL: https://issues.asterisk.org/jira/browse/ASTERISK-30103
>             Project: Asterisk
>          Issue Type: Security
>      Security Level: None
>          Components: Addons/chan_ooh323
>    Affects Versions: 18.10.0
>            Reporter: Michael Bradeen
>            Assignee: Michael Bradeen
>            Severity: Blocker
>              Labels: security
>      Target Release: 16.29.1, 18.15.1, 19.7.1, 20.0.1, 16.30.0, 18.16.0, 19.8.0, 20.1.0
>
>
> When using a called or calling party number with a length of 0 (malformed) it is possible to cause a buffer under-run when parsing.



--
This message was sent by Atlassian JIRA
(v6.2#6252)



More information about the asterisk-bugs mailing list