Описание
The IAX2 channel driver (chan_iax2) for Asterisk 1.2.x before 1.2.9 and 1.0.x before 1.0.11 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via truncated IAX 2 (IAX2) video frames, which bypasses a length check and leads to a buffer overflow involving negative length check. NOTE: the vendor advisory claims that only a DoS is possible, but the original researcher is reliable.
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 1.2.7.1.dfsg-2ubuntu3.4 |
devel | released | 1.4.11~dfsg-1 |
edgy | released | 1.2.12.1.dfsg-1ubuntu1.4 |
feisty | released | 1.2.16~dfsg-1ubuntu3.1 |
gutsy | released | 1.4.11~dfsg-1 |
hardy | released | 1.4.11~dfsg-1 |
intrepid | released | 1.4.11~dfsg-1 |
jaunty | released | 1.4.11~dfsg-1 |
karmic | released | 1.4.11~dfsg-1 |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | ignored | end of life |
devel | DNE | |
edgy | released | 1.2.8.dfsg-1 |
feisty | released | 1.2.8.dfsg-1 |
gutsy | released | 1.2.8.dfsg-1 |
hardy | released | 1.2.8.dfsg-1 |
intrepid | released | 1.2.8.dfsg-1 |
jaunty | released | 1.2.8.dfsg-1 |
karmic | released | 1.2.8.dfsg-1 |
upstream | needs-triage |
Показывать по
Ссылки на источники
7.5 High
CVSS2
Связанные уязвимости
The IAX2 channel driver (chan_iax2) for Asterisk 1.2.x before 1.2.9 and 1.0.x before 1.0.11 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via truncated IAX 2 (IAX2) video frames, which bypasses a length check and leads to a buffer overflow involving negative length check. NOTE: the vendor advisory claims that only a DoS is possible, but the original researcher is reliable.
The IAX2 channel driver (chan_iax2) for Asterisk 1.2.x before 1.2.9 an ...
The IAX2 channel driver (chan_iax2) for Asterisk 1.2.x before 1.2.9 and 1.0.x before 1.0.11 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via truncated IAX 2 (IAX2) video frames, which bypasses a length check and leads to a buffer overflow involving negative length check. NOTE: the vendor advisory claims that only a DoS is possible, but the original researcher is reliable.
7.5 High
CVSS2