CVE-2008-1333
Published: 20 March 2008
Format string vulnerability in Asterisk Open Source 1.6.x before 1.6.0-beta6 might allow remote attackers to execute arbitrary code via logging messages that are not properly handled by (1) the ast_verbose logging API call, or (2) the astman_append function.
Notes
Author | Note |
---|---|
jdstrand | 1.2 and 1.4 not exploitable, but need fix (per Debian) |
Priority
Status
Package | Release | Status |
---|---|---|
asterisk Launchpad, Ubuntu, Debian |
dapper |
Ignored
(end of life)
|
edgy |
Ignored
(end of life, was needed)
|
|
feisty |
Ignored
(end of life, was needed)
|
|
gutsy |
Ignored
(end of life, was needed)
|
|
hardy |
Released
(1:1.4.17~dfsg-2ubuntu1)
|
|
intrepid |
Released
(1:1.4.17~dfsg-2ubuntu1)
|
|
jaunty |
Released
(1:1.4.17~dfsg-2ubuntu1)
|
|
karmic |
Released
(1:1.4.17~dfsg-2ubuntu1)
|
|
upstream |
Needs triage
|