[Asterisk-Security] Multiple Vulnerabilities in Asterisk 1.2.10
(Fixed in 1.2.11)
Tzafrir Cohen
tzafrir.cohen at xorcom.com
Sun Aug 27 02:14:50 MST 2006
On Sun, Aug 27, 2006 at 10:05:11AM +0200, Matt Riddell (IT) wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Tzafrir Cohen wrote:
> > Note that the issue "exists in the code" in 1.2.11 just as it has
> > existed in 1.2.10 and before. And has much larger potential impact (as
> > usual) if Asterisk is run as root.
>
> Can you expand a little? Is 1.2.11 still vulnerable?
Right. If you use something like:
Record(${CALLERIDNAME})
then yes, your Asterisk installation is still vulnerable.
BTW, even in such a stupid case,
Record(rec-${CALLERIDNAME})
helps.
Unless I misread the advisory.
--
Tzafrir Cohen sip:tzafrir at local.xorcom.com
icq#16849755 iax:tzafrir at local.xorcom.com
+972-50-7952406 jabber:tzafrir at jabber.org
tzafrir.cohen at xorcom.com http://www.xorcom.com
More information about the Asterisk-Security
mailing list