Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2006-2898

Overview

Vulnerability Score 7.5 7.5
CVE Id CVE-2006-2898
Last Modified 07 Mar 2011 12:00:00
Published 07 Jun 2006 06:02:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2006-2898

Summary

The IAX2 channel driver (chan_iax2) for Asterisk 1.2.x before 1.2.9 and 1.0.x before 1.0.11 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via truncated IAX 2 (IAX2) video frames, which bypasses a length check and leads to a buffer overflow involving negative length check. NOTE: the vendor advisory claims that only a DoS is possible, but the original researcher is reliable.

Vulnerable Systems

Application

  • Digium Asterisk 1.0.10

  • Digium Asterisk 1.0.7

  • Digium Asterisk 1.0.8

  • Digium Asterisk 1.0.9

  • Digium Asterisk 1.2.0 Beta1

  • Digium Asterisk 1.2.0 Beta2

  • Digium Asterisk 1.2.6

  • Digium Asterisk 1.2.7

  • Digium Asterisk 1.2.8


References

BID - 18295

BUGTRAQ - 20060606 Asterisk 1.2.9 and Asterisk 1.0.11 Released - Security Fix

SECTRACK - 1016236

SECUNIA - 20497

XF - asterisk-iax2-videoframe-bo(27045)

VUPEN - ADV-2006-2181

BUGTRAQ - 20060609 CORE-2006-0330: Asterisk PBX truncated video frame vulnerability

SUSE - SUSE-SR:2006:015

GENTOO - GLSA-200606-15

DEBIAN - DSA-1126

CONFIRM - http://www.asterisk.org/node/95

SECUNIA - 21222

SECUNIA - 20899

SECUNIA - 20658


Last Updated: 27 May 2016 10:42:48