CVE-2006-2898
Published: 7 June 2006
The IAX2 channel driver (chan_iax2) for Asterisk 1.2.x before 1.2.9 and 1.0.x before 1.0.11 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via truncated IAX 2 (IAX2) video frames, which bypasses a length check and leads to a buffer overflow involving negative length check. NOTE: the vendor advisory claims that only a DoS is possible, but the original researcher is reliable.
Priority
Status
Package | Release | Status |
---|---|---|
asterisk Launchpad, Ubuntu, Debian |
dapper |
Released
(1.2.7.1.dfsg-2ubuntu3.4)
|
edgy |
Released
(1.2.12.1.dfsg-1ubuntu1.4)
|
|
feisty |
Released
(1.2.16~dfsg-1ubuntu3.1)
|
|
gutsy |
Released
(1.4.11~dfsg-1)
|
|
hardy |
Released
(1.4.11~dfsg-1)
|
|
intrepid |
Released
(1.4.11~dfsg-1)
|
|
jaunty |
Released
(1.4.11~dfsg-1)
|
|
karmic |
Released
(1.4.11~dfsg-1)
|
|
upstream |
Needs triage
|
|
zaptel Launchpad, Ubuntu, Debian |
dapper |
Ignored
(end of life)
|
edgy |
Released
(1.2.8.dfsg-1)
|
|
feisty |
Released
(1.2.8.dfsg-1)
|
|
gutsy |
Released
(1.2.8.dfsg-1)
|
|
hardy |
Released
(1.2.8.dfsg-1)
|
|
intrepid |
Released
(1.2.8.dfsg-1)
|
|
jaunty |
Released
(1.2.8.dfsg-1)
|
|
karmic |
Released
(1.2.8.dfsg-1)
|
|
upstream |
Needs triage
|