Vulnerabilities > Digium > Asterisk > 1.2.beta1
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2011-01-20 | CVE-2011-0495 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Digium Asterisk Stack-based buffer overflow in the ast_uri_encode function in main/utils.c in Asterisk Open Source before 1.4.38.1, 1.4.39.1, 1.6.1.21, 1.6.2.15.1, 1.6.2.16.1, 1.8.1.2, 1.8.2.; and Business Edition before C.3.6.2; when running in pedantic mode allows remote authenticated users to execute arbitrary code via crafted caller ID data in vectors involving the (1) SIP channel driver, (2) URIENCODE dialplan function, or (3) AGI dialplan function. | 6.0 |
2007-03-07 | CVE-2007-1306 | Remote Denial of Service vulnerability in Asterisk SIP Channel Driver Asterisk 1.4 before 1.4.1 and 1.2 before 1.2.16 allows remote attackers to cause a denial of service (crash) by sending a Session Initiation Protocol (SIP) packet without a URI and SIP-version header, which results in a NULL pointer dereference. | 7.8 |
2006-10-23 | CVE-2006-5444 | Remote Buffer Overflow vulnerability in Asterisk Chan_Skinny Integer overflow in the get_input function in the Skinny channel driver (chan_skinny.c) in Asterisk 1.0.x before 1.0.12 and 1.2.x before 1.2.13, as used by Cisco SCCP phones, allows remote attackers to execute arbitrary code via a certain dlen value that passes a signed integer comparison and leads to a heap-based buffer overflow. | 7.5 |