Buffer overflow in the get_msg_text of chan_sip.c in the Session Initiation Protocol (SIP) protocol implementation for Asterisk releases before August 15, 2003, allows remote malicious users to execute arbitrary code via certain (1) MESSAGE or (2) INFO requests.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
digium asterisk 1.2.13 |