CVE-2006-4346

critical

Description

Asterisk 1.2.10 supports the use of client-controlled variables to determine filenames in the Record function, which allows remote attackers to (1) execute code via format string specifiers or (2) overwrite files via directory traversals involving unspecified vectors, as demonstrated by the CALLERIDNAME variable.

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/28564

https://exchange.xforce.ibmcloud.com/vulnerabilities/28544

http://www.vupen.com/english/advisories/2006/3372

http://www.sineapps.com/news.php?rssid=1448

http://www.securityfocus.com/bid/19683

http://www.securityfocus.com/archive/1/444322/100/0/threaded

http://www.gentoo.org/security/en/glsa/glsa-200610-15.xml

http://securitytracker.com/id?1016742

http://secunia.com/advisories/22651

http://labs.musecurity.com/advisories/MU-200608-01.txt

Details

Source: Mitre, NVD

Published: 2006-08-24

Updated: 2018-10-17

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical