![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.142857 |
Kategorie: | Denial of Service |
Titel: | Asterisk Audio Transcoding DoS Vulnerability (AST-2019-005) |
Zusammenfassung: | Asterisk is prone to a denial of service vulnerability in audio; transcoding. |
Beschreibung: | Summary: Asterisk is prone to a denial of service vulnerability in audio transcoding. Vulnerability Insight: This issue presented itself when an RTP packet containing no audio (and thus no samples) was received. In a particular transcoding scenario this audio frame would get turned into a frame with no origin information. If this new frame was then given to the audio transcoding support a crash would occur as no samples and no origin information would be present. The transcoding scenario requires the 'genericplc' option to be set to enabled (the default) and a transcoding path from the source format into signed linear and then from signed linear into another format. Affected Software/OS: Asterisk Open Source 13.28.0 and 16.5.0. Solution: Update to version 13.28.1, 16.5.1 or later. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2019-15639 http://packetstormsecurity.com/files/154372/Asterisk-Project-Security-Advisory-AST-2019-005.html |
Copyright | Copyright (C) 2019 Greenbone AG |
Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |