Vulnerability CVE-2006-2923


Published: 2006-06-09   Modified: 2012-02-12

Description:
The iax_net_read function in the iaxclient open source library, as used in multiple products including (a) LoudHush 1.3.6, (b) IDE FISK 1.35 and earlier, (c) Kiax 0.8.5 and earlier, (d) DIAX, (e) Ziaxphone, (f) IAX Phone, (g) X-lite, (h) MediaX, (i) Extreme Networks ePhone, and (j) iaxComm before 1.2.0, allows remote attackers to execute arbitrary code via crafted IAX 2 (IAX2) packets with truncated (1) full frames or (2) mini-frames, which are detected in a length check but still processed, leading to buffer overflows related to negative length values.

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.4/10
4.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
None
Affected software
Loudhush -> Loudhush 

 References:
http://iaxclient.sourceforge.net/iaxcomm/
http://sourceforge.net/project/shownotes.php?release_id=423099&group_id=131960
http://www.coresecurity.com/common/showdoc.php?idx=548&idxseccion=10
http://www.gentoo.org/security/en/glsa/glsa-200606-30.xml
http://www.loudhush.ro/changelog.txt
http://www.securityfocus.com/archive/1/436638/100/0/threaded
http://www.securityfocus.com/bid/18307
http://www.vupen.com/english/advisories/2006/2180
http://www.vupen.com/english/advisories/2006/2284
http://www.vupen.com/english/advisories/2006/2285
http://www.vupen.com/english/advisories/2006/2286
https://exchange.xforce.ibmcloud.com/vulnerabilities/27047

Copyright 2024, cxsecurity.com

 

Back to Top