Multiple buffer overflows in the switch_perform_substitution function in switch_regex.c in FreeSWITCH 1.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to the index and substituted variables.
References
| Link | Resource |
|---|---|
| http://jira.freeswitch.org/browse/FS-5566 | Exploit Patch |
| http://www.openwall.com/lists/oss-security/2013/07/04/4 | Patch |
| http://jira.freeswitch.org/browse/FS-5566 | Exploit Patch |
| http://www.openwall.com/lists/oss-security/2013/07/04/4 | Patch |
Configurations
History
21 Nov 2024, 01:51
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://jira.freeswitch.org/browse/FS-5566 - Exploit, Patch | |
| References | () http://www.openwall.com/lists/oss-security/2013/07/04/4 - Patch |
Information
Published : 2013-09-30 22:55
Updated : 2025-04-11 00:51
NVD link : CVE-2013-2238
Mitre link : CVE-2013-2238
CVE.ORG link : CVE-2013-2238
JSON object : View
Products Affected
freeswitch
- freeswitch
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
