aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml/vuln.xml
diff options
context:
space:
mode:
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r--security/vuxml/vuln.xml38
1 files changed, 38 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 81f2121ebd11..186ecf8086d7 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -57,6 +57,44 @@ Notes:
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="e60d9e65-3f6b-11e4-ad16-001999f8d30b">
+ <topic>asterisk -- Remotely triggered crash</topic>
+ <affects>
+ <package>
+ <name>asterisk11</name>
+ <range><lt>11.12.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Asterisk project reports:</p>
+ <blockquote cite="https://www.asterisk.org/security">
+ <p>When an out of call message - delivered by either the
+ SIP or PJSIP channel driver or the XMPP stack - is handled
+ in Asterisk, a crash can occur if the channel servicing
+ the message is sent into the ReceiveFax dialplan application
+ while using the res_fax_spandsp module.</p>
+ <p>Note that this crash does not occur when using the
+ res_fax_digium module. While this crash technically
+ occurs due to a configuration issue, as attempting to
+ receive a fax from a channel driver that only contains
+ textual information will never succeed, the likelihood
+ of having it occur is sufficiently high as to warrant
+ this advisory.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://downloads.asterisk.org/pub/security/AST-2014-010.pdf</url>
+ <url>https://issues.asterisk.org/jira/browse/ASTERISK-24301</url>
+ <url>https://www.asterisk.org/security</url>
+ </references>
+ <dates>
+ <discovery>2014-09-05</discovery>
+ <entry>2014-09-18</entry>
+ </dates>
+ </vuln>
+
<vuln vid="36a415c8-3867-11e4-b522-00262d5ed8ee">
<topic>www/chromium -- multiple vulnerabilities</topic>
<affects>