Lucene search

K
mageiaGentoo FoundationMGASA-2014-0300
HistoryJul 26, 2014 - 4:52 p.m.

Updated asterisk packages fix security vulnerabilities

2014-07-2616:52:06
Gentoo Foundation
advisories.mageia.org
11

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.011 Low

EPSS

Percentile

84.2%

Updated asterisk packages fix security vulnerabilities: Asterisk Open Source 11.x before 11.10.1 and 12.x before 12.3.1 and Certified Asterisk 11.6 before 11.6-cert3 allows remote authenticated Manager users to execute arbitrary shell commands via a MixMonitor action (CVE-2014-4046). Asterisk Open Source 1.8.x before 1.8.28.1, 11.x before 11.10.1, and 12.x before 12.3.1 and Certified Asterisk 1.8.15 before 1.8.15-cert6 and 11.6 before 11.6-cert3 allows remote attackers to cause a denial of service (connection consumption) via a large number of (1) inactive or (2) incomplete HTTP connections (CVE-2014-4047).

OSVersionArchitecturePackageVersionFilename
Mageia3noarchasterisk< 11.11.0-1asterisk-11.11.0-1.mga3
Mageia4noarchasterisk< 11.11.0-1asterisk-11.11.0-1.mga4

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.011 Low

EPSS

Percentile

84.2%