blob: 79dba3e6f7f53f0916f5bb3410440c9203da0d7b [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200606-15">
<title>Asterisk: IAX2 video frame buffer overflow</title>
Asterisk contains a bug in the IAX2 channel driver making it vulnerable to
the remote execution of arbitrary code.
<product type="ebuild">asterisk</product>
<announced>June 14, 2006</announced>
<revised>June 14, 2006: 01</revised>
<package name="net-misc/asterisk" auto="yes" arch="*">
<unaffected range="ge">1.0.11_p1</unaffected>
<vulnerable range="lt">1.0.11_p1</vulnerable>
Asterisk is an open source implementation of a telephone private branch
exchange (PBX).
Asterisk fails to properly check the length of truncated video frames
in the IAX2 channel driver which results in a buffer overflow.
<impact type="high">
An attacker could exploit this vulnerability by sending a specially
crafted IAX2 video stream resulting in the execution of arbitrary code
with the permissions of the user running Asterisk.
Disable public IAX2 support.
All Asterisk users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-misc/asterisk-1.0.11_p1&quot;</code>
<uri link="">CVE-2006-2898</uri>
<uri link=";idxseccion=10">Corelabs Asterisk PBX truncated video frame vulnerability advisory</uri>
<metadata tag="requester" timestamp="Thu, 08 Jun 2006 10:46:16 +0000">
<metadata tag="submitter" timestamp="Fri, 09 Jun 2006 08:21:48 +0000">
<metadata tag="bugReady" timestamp="Wed, 14 Jun 2006 09:36:11 +0000">