Vulnerabilities > Digium > Asterisk > 1.0.rc2

DATE CVE VULNERABILITY TITLE RISK
2011-01-20 CVE-2011-0495 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Digium Asterisk
Stack-based buffer overflow in the ast_uri_encode function in main/utils.c in Asterisk Open Source before 1.4.38.1, 1.4.39.1, 1.6.1.21, 1.6.2.15.1, 1.6.2.16.1, 1.8.1.2, 1.8.2.; and Business Edition before C.3.6.2; when running in pedantic mode allows remote authenticated users to execute arbitrary code via crafted caller ID data in vectors involving the (1) SIP channel driver, (2) URIENCODE dialplan function, or (3) AGI dialplan function.
6.0
2006-08-24 CVE-2006-4345 Remote vulnerability in Asterisk
Stack-based buffer overflow in channels/chan_mgcp.c in MGCP in Asterisk 1.0 through 1.2.10 allows remote attackers to execute arbitrary code via a crafted audit endpoint (AUEP) response.
network
low complexity
digium
7.5
2006-04-18 CVE-2006-1827 Integer Overflow vulnerability in Asterisk JPEG File Handling
Integer signedness error in format_jpeg.c in Asterisk 1.2.6 and earlier allows remote attackers to execute arbitrary code via a length value that passes a length check as a negative number, but triggers a buffer overflow when it is used as an unsigned length.
network
low complexity
digium
6.4
2005-11-16 CVE-2005-3559 Unspecified vulnerability in Digium Asterisk
Directory traversal vulnerability in vmail.cgi in Asterisk 1.0.9 through 1.2.0-beta1 allows remote attackers to access WAV files via a ..
network
low complexity
digium
5.0