First published: Fri Nov 30 2007(Updated: )
SQL injection vulnerability in the Postgres Realtime Engine (res_config_pgsql) in Asterisk 1.4.x before 1.4.15 and C.x before C.1.0-beta6 allows remote attackers to execute arbitrary SQL commands via unknown vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asterisk | >=1.4.0<1.4.15 | |
Asterisk | =c.1.0-beta1 | |
Asterisk | =c.1.0-beta2 | |
Asterisk | =c.1.0-beta3 | |
Asterisk | =c.1.0-beta4 | |
Asterisk | =c.1.0-beta5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6171 is classified as a critical SQL injection vulnerability that allows remote attackers to execute arbitrary SQL commands.
To fix CVE-2007-6171, upgrade Asterisk to version 1.4.15 or later, or to C.1.0-beta6 or later.
Asterisk versions before 1.4.15 and C.1.0 beta versions up to beta5 are affected by CVE-2007-6171.
Yes, CVE-2007-6171 can be exploited remotely, allowing attackers to execute SQL commands from outside the system.
Exploitation of CVE-2007-6171 can lead to unauthorized data access, data manipulation, or complete system compromise.