The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade Debian:unstable
asterisk
to version 1:20.9.3dfsg+cs6.14.60671435-1 or higher.
Note: Versions mentioned in the description apply only to the upstream asterisk
package and not the asterisk
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
Asterisk is an open source private branch exchange (PBX) and telephony toolkit. Prior to asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2, an AMI user with write=originate
may change all configuration files in the /etc/asterisk/
directory. This occurs because they are able to curl remote files and write them to disk, but are also able to append to existing files using the FILE
function inside the SET
application. This issue may result in privilege escalation, remote code execution and/or blind server-side request forgery with arbitrary protocol. Asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2 contain a fix for this issue.