Integer signedness error in format_jpeg.c in Asterisk 1.2.6 and previous versions allows remote malicious users to execute arbitrary code via a length value that passes a length check as a negative number, but triggers a buffer overflow when it is used as an unsigned length.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
digium asterisk 0.1.10 |
||
digium asterisk 0.1.11 |
||
digium asterisk 0.1.12 |
||
digium asterisk 0.1.8 |
||
digium asterisk 0.1.9 |
||
digium asterisk 0.4.0 |
||
digium asterisk 0.5.0 |
||
digium asterisk 1.0.3 |
||
digium asterisk 1.0.4 |
||
digium asterisk 1.0.5 |
||
digium asterisk 1.2.0_beta1 |
||
digium asterisk |
||
digium asterisk 0.1.0 |
||
digium asterisk 0.1.1 |
||
digium asterisk 0.1.6 |
||
digium asterisk 0.1.7 |
||
digium asterisk 0.3.0 |
||
digium asterisk 0.4 |
||
digium asterisk 1.0.1 |
||
digium asterisk 1.0.2 |
||
digium asterisk 1.0_rc1 |
||
digium asterisk 1.0_rc2 |
||
digium asterisk 0.1.4 |
||
digium asterisk 0.1.5 |
||
digium asterisk 0.2.0 |
||
digium asterisk 0.3 |
||
digium asterisk 0.7.2 |
||
digium asterisk 1.0.0 |
||
digium asterisk 1.0.8 |
||
digium asterisk 1.0.9 |
||
digium asterisk 0.1.2 |
||
digium asterisk 0.1.3 |
||
digium asterisk 0.1.9.1 |
||
digium asterisk 0.2 |
||
digium asterisk 0.7.0 |
||
digium asterisk 0.7.1 |
||
digium asterisk 1.0.6 |
||
digium asterisk 1.0.7 |