Vulnerability CVE-2011-0495


Published: 2011-01-20   Modified: 2012-02-13

Description:
Stack-based buffer overflow in the ast_uri_encode function in main/utils.c in Asterisk Open Source before 1.4.38.1, 1.4.39.1, 1.6.1.21, 1.6.2.15.1, 1.6.2.16.1, 1.8.1.2, 1.8.2.; and Business Edition before C.3.6.2; when running in pedantic mode allows remote authenticated users to execute arbitrary code via crafted caller ID data in vectors involving the (1) SIP channel driver, (2) URIENCODE dialplan function, or (3) AGI dialplan function.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
SIP channel driver Stack buffer overflow
Asterisk Securit...
25.01.2011

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:N/AC:M/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6/10
6.4/10
6.8/10
Exploit range
Attack complexity
Authentication
Remote
Medium
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Digium -> Asterisk 

 References:
http://downloads.asterisk.org/pub/security/AST-2011-001-1.6.2.diff
http://downloads.asterisk.org/pub/security/AST-2011-001.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053689.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053713.html
http://www.debian.org/security/2011/dsa-2171
http://www.securityfocus.com/archive/1/515781/100/0/threaded
http://www.securityfocus.com/bid/45839
http://www.vupen.com/english/advisories/2011/0159
http://www.vupen.com/english/advisories/2011/0281
http://www.vupen.com/english/advisories/2011/0449
https://exchange.xforce.ibmcloud.com/vulnerabilities/64831

Copyright 2024, cxsecurity.com

 

Back to Top