CVE-2011-1147
Published: 15 March 2011
Multiple stack-based and heap-based buffer overflows in the (1) decode_open_type and (2) udptl_rx_packet functions in main/udptl.c in Asterisk Open Source 1.4.x before 1.4.39.2, 1.6.1.x before 1.6.1.22, 1.6.2.x before 1.6.2.16.2, and 1.8 before 1.8.2.4; Business Edition C.x.x before C.3.6.3; AsteriskNOW 1.5; and s800i (Asterisk Appliance), when T.38 support is enabled, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UDPTL packet.
Priority
Status
Package | Release | Status |
---|---|---|
asterisk Launchpad, Ubuntu, Debian |
dapper |
Ignored
(end of life)
|
hardy |
Ignored
(end of life)
|
|
karmic |
Ignored
(end of life)
|
|
lucid |
Released
(1:1.6.2.5-0ubuntu1.4)
|
|
maverick |
Released
(1:1.6.2.7-1ubuntu1.2)
|
|
natty |
Released
(1:1.6.2.9-2ubuntu2.1)
|
|
upstream |
Released
(1.4.39.2, 1.6.2.16.2, 1.8.2.4)
|
|
Patches: upstream: http://downloads.asterisk.org/pub/security/AST-2011-002-1.6.2.diff |