Vulnerabilities > CVE-2006-1827 - Unspecified vulnerability in Digium Asterisk

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
digium
nessus

Summary

Integer signedness error in format_jpeg.c in Asterisk 1.2.6 and earlier allows remote attackers to execute arbitrary code via a length value that passes a length check as a negative number, but triggers a buffer overflow when it is used as an unsigned length.

Nessus

  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-1048.NASL
    descriptionSeveral problems have been discovered in Asterisk, an Open Source Private Branch Exchange (telephone control center). The Common Vulnerabilities and Exposures project identifies the following problems : - CVE-2005-3559 Adam Pointon discovered that due to missing input sanitising it is possible to retrieve recorded phone messages for a different extension. - CVE-2006-1827 Emmanouel Kellinis discovered an integer signedness error that could trigger a buffer overflow and hence allow the execution of arbitrary code.
    last seen2020-06-01
    modified2020-06-02
    plugin id22590
    published2006-10-14
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/22590
    titleDebian DSA-1048-1 : asterisk - several vulnerabilities
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_8B683BEAD49C11DAA672000E0C2E438A.NASL
    descriptionEmmanouel Kellenis reports a denial of service vulnerability within asterisk. The vulnerability is caused by a buffer overflow in
    last seen2020-06-01
    modified2020-06-02
    plugin id21468
    published2006-05-13
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21468
    titleFreeBSD : asterisk -- denial of service vulnerability, local system access (8b683bea-d49c-11da-a672-000e0c2e438a)