ID CVE-2006-1827
Summary Integer signedness error in format_jpeg.c in Asterisk 1.2.6 and earlier allows remote attackers to execute arbitrary code via a length value that passes a length check as a negative number, but triggers a buffer overflow when it is used as an unsigned length.
References
Vulnerable Configurations
  • cpe:2.3:a:digium:asterisk:0.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.1.5:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.1.7:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.1.7:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.1.8:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.1.8:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.1.9:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.1.9:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.1.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.1.9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.1.10:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.1.10:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.1.11:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.1.11:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.1.12:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.1.12:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.2:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.3:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.4:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.0_rc1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.0_rc1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.0_rc2:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.0_rc2:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.2.0_beta1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.2.0_beta1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.7:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.9:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.9.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.0.11.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.0.11.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.0.12:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.2.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.2.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.2.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.2.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.2.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.2.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.2.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.2.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.2.2:netsec:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.2.2:netsec:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.2.3:netsec:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.2.3:netsec:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.2.6:*:*:*:*:*:*:*
CVSS
Base: 6.4 (as of 08-03-2011 - 02:34)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:P/A:P
refmap via4
bid 17561
confirm http://ftp.digium.com/pub/asterisk/releases/asterisk-1.2.7-patch.gz
debian DSA-1048
misc http://www.cipher.org.uk/index.php?p=advisories/Asterisk_Codec_Integer_Overflow_07-04-2006.advisory
secunia
  • 19800
  • 19872
  • 19897
suse SUSE-SR:2006:009
vupen ADV-2006-1478
Last major update 08-03-2011 - 02:34
Published 18-04-2006 - 20:02
Last modified 08-03-2011 - 02:34
Back to Top