Lucene search

K
mageiaGentoo FoundationMGASA-2013-0279
HistorySep 19, 2013 - 1:32 p.m.

Updated freeswitch packages fix security vulnerability

2013-09-1913:32:15
Gentoo Foundation
advisories.mageia.org
10

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

74.8%

In FreeSWITCH before 1.2.12, if the routing configuration includes regular expressions that don’t constrain the length of the input, buffer overflows are possible. Since these regular expressions are matched against untrusted input, remote code execution may be possible (CVE-2013-2238).

OSVersionArchitecturePackageVersionFilename
Mageia3noarchfreeswitch< 1.2.12-6freeswitch-1.2.12-6.mga3

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

74.8%

Related for MGASA-2013-0279