First published: Thu Aug 24 2006(Updated: )
Asterisk 1.2.10 supports the use of client-controlled variables to determine filenames in the Record function, which allows remote attackers to (1) execute code via format string specifiers or (2) overwrite files via directory traversals involving unspecified vectors, as demonstrated by the CALLERIDNAME variable.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asterisk | =1.2.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4346 is classified as a medium severity vulnerability due to its potential for remote code execution and file manipulation.
To remediate CVE-2006-4346, it's recommended to upgrade Asterisk to a version beyond 1.2.10 where this vulnerability is patched.
CVE-2006-4346 can facilitate attacks through code execution via format string vulnerabilities and unauthorized file overwriting due to directory traversal.
CVE-2006-4346 specifically affects Asterisk version 1.2.10.
Yes, CVE-2006-4346 can be exploited remotely, allowing attackers to execute malicious code on affected systems.