aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml
diff options
context:
space:
mode:
authorGuido Falsi <madpilot@FreeBSD.org>2014-09-18 19:53:09 +0000
committerGuido Falsi <madpilot@FreeBSD.org>2014-09-18 19:53:09 +0000
commit2814daf1707f41ab15f3289e9f88e2e24b4d0abb (patch)
treef45b582ca745068a764c84fed2279cddfddf20c7 /security/vuxml
parent4616437075c53ae2659a8e83fb5a664368b9fe44 (diff)
downloadports-2814daf1707f41ab15f3289e9f88e2e24b4d0abb.tar.gz
ports-2814daf1707f41ab15f3289e9f88e2e24b4d0abb.zip
Notes
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml38
1 files changed, 38 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 832552af817f..0ea348048511 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -57,6 +57,44 @@ Notes:
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="e60d9e65-3f6b-11e4-ad16-001999f8d30b">
+ <topic>asterisk -- Remotely triggered crash</topic>
+ <affects>
+ <package>
+ <name>asterisk11</name>
+ <range><lt>11.12.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Asterisk project reports:</p>
+ <blockquote cite="https://www.asterisk.org/security">
+ <p>When an out of call message - delivered by either the
+ SIP or PJSIP channel driver or the XMPP stack - is handled
+ in Asterisk, a crash can occur if the channel servicing
+ the message is sent into the ReceiveFax dialplan application
+ while using the res_fax_spandsp module.</p>
+ <p>Note that this crash does not occur when using the
+ res_fax_digium module. While this crash technically
+ occurs due to a configuration issue, as attempting to
+ receive a fax from a channel driver that only contains
+ textual information will never succeed, the likelihood
+ of having it occur is sufficiently high as to warrant
+ this advisory.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://downloads.asterisk.org/pub/security/AST-2014-010.pdf</url>
+ <url>https://issues.asterisk.org/jira/browse/ASTERISK-24301</url>
+ <url>https://www.asterisk.org/security</url>
+ </references>
+ <dates>
+ <discovery>2014-09-05</discovery>
+ <entry>2014-09-18</entry>
+ </dates>
+ </vuln>
+
<vuln vid="d3324c55-3f11-11e4-ad16-001999f8d30b">
<topic>squid -- Buffer overflow in SNMP processing</topic>
<affects>