MGASA-2013-0384

Source
https://advisories.mageia.org/MGASA-2013-0384.html
Import Source
https://advisories.mageia.org/MGASA-2013-0384.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2013-0384
Related
Published
2013-12-23T17:15:47Z
Modified
2013-12-23T17:14:39Z
Summary
Updated asterisk packages fix CVE-2013-7100
Details

Updated asterisk packages fix security vulnerability:

Buffer overflow in the unpacksms16 function in apps/app_sms.c in Asterisk Open Source 1.8.x before 1.8.24.1, 10.x before 10.12.4, and 11.x before 11.6.1; Asterisk with Digiumphones 10.x-digiumphones before 10.12.4-digiumphones; and Certified Asterisk 1.8.x before 1.8.15-cert4 and 11.x before 11.2-cert3 allows remote attackers to cause a denial of service (daemon crash) via a 16-bit SMS message (CVE-2013-7100).

The updated packages has been upgraded to the 11.7.0 version which resolves various upstream bugs and is not vulnerable to this issue.

References
Credits

Affected packages

Mageia:3 / asterisk

Package

Name
asterisk
Purl
pkg:rpm/mageia/asterisk?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
11.7.0-1.mga3

Ecosystem specific

{
    "section": "core"
}