Security
Headlines
HeadlinesLatestCVEs

Tag

#redis

FreeSWITCH 1.10.6 SIP Flooding Denial Of Service

FreeSWITCH versions 1.10.6 and below suffer from a SIP flooding denial of service vulnerability.

Packet Storm
#vulnerability#dos#sql#vulnerability#ubuntu#vulnerability#sql#ubuntu#vulnerability#vulnerability#vulnerability#vulnerability#apache#vulnerability#red_hat#dos#redis#vulnerability#sql#vulnerability#vulnerability#dos
FreeSWITCH 1.10.6 SIP Digest Leak

FreeSWITCH versions 1.10.6 and below suffer from a SIP digest leak vulnerability. An attacker can perform a SIP digest leak attack against FreeSWITCH and receive the challenge response of a gateway configured on the FreeSWITCH server. This is done by challenging FreeSWITCH's SIP requests with the realm set to that of the gateway, thus forcing FreeSWITCH to respond with the challenge response which is based on the password of that targeted gateway.

Red Hat Security Advisory 2021-3967-01

Red Hat Security Advisory 2021-3967-01 - The OpenJDK 11 packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. This release of the Red Hat build of OpenJDK 11 for portable Linux serves as a replacement for the Red Hat build of OpenJDK 11 and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.

Red Hat Security Advisory 2021-3968-01

Red Hat Security Advisory 2021-3968-01 - The OpenJDK 11 packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. This release of the Red Hat build of OpenJDK 11 for Windows serves as a replacement for the Red Hat build of OpenJDK 11 and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.

Ubuntu Security Notice USN-5122-1

Ubuntu Security Notice 5122-1 - It was discovered that Apport could be tricked into writing core files as root into arbitrary directories in certain scenarios. A local attacker could possibly use this issue to escalate privileges. This update will cause Apport to generate all core files in the /var/lib/apport/coredump directory.