vendor:
Asterisk
by:
Unknown
7.5
CVSS
HIGH
Remote Code Execution
Not provided
CWE
Product Name: Asterisk
Affected Version From: Not provided
Affected Version To: Not provided
Patch Exists: NO
Related CWE: Not provided
CPE: Not provided
Platforms Tested:
2007
asterisk-Invite.pl Perl Script
This Perl script is used to send a crafted INVITE message to an Asterisk server, triggering a remote code execution vulnerability. The script takes command-line arguments for the destination IP address, port, username, source IP address, port, and username. It creates a UDP socket and sends the INVITE message with a specially crafted payload. This vulnerability allows an attacker to execute arbitrary code on the target server.
Mitigation:
Update to a patched version of Asterisk or apply the vendor's recommended security updates.