The IAX2 channel driver (chan_iax2) for Asterisk 1.2.x prior to 1.2.9 and 1.0.x prior to 1.0.11 allows remote malicious users to cause a denial of service (crash) and execute arbitrary code via truncated IAX 2 (IAX2) video frames, which bypasses a length check and leads to a buffer overflow involving negative length check. NOTE: the vendor advisory claims that only a DoS is possible, but the original researcher is reliable.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
digium asterisk 1.2.0_beta1 |
||
digium asterisk 1.2.0_beta2 |
||
digium asterisk 1.0.10 |
||
digium asterisk 1.0.7 |
||
digium asterisk 1.2.8 |
||
digium asterisk 1.2.6 |
||
digium asterisk 1.2.7 |
||
digium asterisk 1.0.8 |
||
digium asterisk 1.0.9 |