Buffer overflow in DNS SRV and NAPTR lookups in Digium Asterisk 15.x before 15.6.2 and 16.x before 16.0.1 allows remote attackers to crash Asterisk via a specially crafted DNS SRV or NAPTR response, because a buffer size is supposed to match an expanded length but actually matches a compressed length
Reporter | Title | Published | Views | Family All 8 |
---|---|---|---|---|
CVE | CVE-2018-19278 | 14 Nov 201820:29 | – | cve |
Debian CVE | CVE-2018-19278 | 14 Nov 201820:29 | – | debiancve |
Prion | Buffer overflow | 14 Nov 201820:29 | – | prion |
NVD | CVE-2018-19278 | 14 Nov 201820:29 | – | nvd |
Tenable Nessus | Asterisk 15.x < 15.6.2 / 16.x < 16.0.1 DoS (AST-2018-010) | 15 Nov 201800:00 | – | nessus |
Cvelist | CVE-2018-19278 | 14 Nov 201820:00 | – | cvelist |
AlpineLinux | CVE-2018-19278 | 14 Nov 201820:29 | – | alpinelinux |
OpenVAS | Asterisk DoS Vulnerability (AST-2018-010) | 15 Nov 201800:00 | – | openvas |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo