The IAX2 channel driver (chan_iax2) for Asterisk 1.2.x before 1.2.9 and 1.0.x before 1.0.11 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via truncated IAX 2 (IAX2) video frames, which bypasses a length check and leads to a buffer overflow involving negative length check. NOTE: the vendor advisory claims that only a DoS is possible, but the original researcher is reliable.
2006-06-07T10:02:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | digium | asterisk | 1.0.7 | Yes |
Application | digium | asterisk | 1.0.8 | Yes |
Application | digium | asterisk | 1.0.9 | Yes |
Application | digium | asterisk | 1.0.10 | Yes |
Application | digium | asterisk | 1.2.0_beta1 | Yes |
Application | digium | asterisk | 1.2.0_beta2 | Yes |
Application | digium | asterisk | 1.2.6 | Yes |
Application | digium | asterisk | 1.2.7 | Yes |
Application | digium | asterisk | 1.2.8 | Yes |