Abuse of this vulnerability may lead to a massive Denial of Service on vulnerable Asterisk servers for calls that rely on DTLS-SRTP. This attack can be done continuously, thus denying new DTLS-SRTP encrypted calls during the attack. In Asterisk prior to versions 18.20.1, 20.5.1, and 21.0.1 as well as certified-asterisk prior to 18.9-cert6 Asterisk is susceptible to a DoS due to a race condition in the hello handshake phase of the DTLS protocol when handling DTLS-SRTP for media setup. This makes it possible for unauthenticated attackers to place multiple votes on a single poll even when the poll is set to one vote per person.Īsterisk is an open source private branch exchange and telephony toolkit. This is due to improper restrictions on the add() function. The YOP Poll plugin for WordPress is vulnerable to a race condition in all versions up to, and including, 6.5.26. This could allow a local unprivileged user to escalate their privileges on the system. This issue occurs when two threads execute the GSMIOC_SETCONF ioctl on the same tty file descriptor with the gsm line discipline enabled, and can lead to a use-after-free problem on a struct gsm_dlci while restarting the gsm mux. This vulnerability affected GitHub Enterprise Server version 3.8.0 and above and was fixed in version 3.8.12, 3.9.7, 3.10.4, and 3.11.1.Ī race condition was found in the GSM 0710 tty multiplexor in the Linux kernel. This vulnerability affected all versions of GitHub Enterprise Server since 3.8 and was fixed in version 3.8.12, 3.9.7, 3.10.4, and 3.11.1.Ī race condition in GitHub Enterprise Server allowed an existing admin to maintain permissions on transferred repositories by making a GraphQL mutation to alter repository permissions during the transfer. We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.Ī race condition in GitHub Enterprise Server allows an outside collaborator to be added while a repository is being transferred. A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread. A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |