First published: Tue Dec 18 2007(Updated: )
registry.pl in Fonality Trixbox 2.0 PBX products, when running in certain environments, reads and executes a set of commands from a remote web site without sufficiently validating the origin of the commands, which allows remote attackers to disable trixbox and execute arbitrary commands via a DNS spoofing attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trixbox | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6424 is considered to have a critical severity level due to the potential for remote command execution.
To fix CVE-2007-6424, ensure that your Trixbox installation is updated to a version that patches this vulnerability.
The risks associated with CVE-2007-6424 include the potential for unauthorized access to the system and execution of arbitrary commands.
CVE-2007-6424 affects Fonality Trixbox version 2.0 PBX products specifically.
Yes, CVE-2007-6424 can be exploited remotely due to the lack of validation for command sources.