Описание
The IAX2 channel driver (chan_iax2) for Asterisk 1.2.x before 1.2.9 and 1.0.x before 1.0.11 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via truncated IAX 2 (IAX2) video frames, which bypasses a length check and leads to a buffer overflow involving negative length check. NOTE: the vendor advisory claims that only a DoS is possible, but the original researcher is reliable.
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | released | 1.2.7.1.dfsg-2ubuntu3.4 |
| devel | released | 1.4.11~dfsg-1 |
| edgy | released | 1.2.12.1.dfsg-1ubuntu1.4 |
| feisty | released | 1.2.16~dfsg-1ubuntu3.1 |
| gutsy | released | 1.4.11~dfsg-1 |
| hardy | released | 1.4.11~dfsg-1 |
| intrepid | released | 1.4.11~dfsg-1 |
| jaunty | released | 1.4.11~dfsg-1 |
| karmic | released | 1.4.11~dfsg-1 |
| upstream | needs-triage |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | ignored | end of life |
| devel | DNE | |
| edgy | released | 1.2.8.dfsg-1 |
| feisty | released | 1.2.8.dfsg-1 |
| gutsy | released | 1.2.8.dfsg-1 |
| hardy | released | 1.2.8.dfsg-1 |
| intrepid | released | 1.2.8.dfsg-1 |
| jaunty | released | 1.2.8.dfsg-1 |
| karmic | released | 1.2.8.dfsg-1 |
| upstream | needs-triage |
Показывать по
Ссылки на источники
EPSS
7.5 High
CVSS2
Связанные уязвимости
The IAX2 channel driver (chan_iax2) for Asterisk 1.2.x before 1.2.9 and 1.0.x before 1.0.11 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via truncated IAX 2 (IAX2) video frames, which bypasses a length check and leads to a buffer overflow involving negative length check. NOTE: the vendor advisory claims that only a DoS is possible, but the original researcher is reliable.
The IAX2 channel driver (chan_iax2) for Asterisk 1.2.x before 1.2.9 an ...
The IAX2 channel driver (chan_iax2) for Asterisk 1.2.x before 1.2.9 and 1.0.x before 1.0.11 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via truncated IAX 2 (IAX2) video frames, which bypasses a length check and leads to a buffer overflow involving negative length check. NOTE: the vendor advisory claims that only a DoS is possible, but the original researcher is reliable.
EPSS
7.5 High
CVSS2