Vulnerabilities > Digium > Asterisk > 1.2.beta2

DATE CVE VULNERABILITY TITLE RISK
2011-01-20 CVE-2011-0495 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Digium Asterisk
Stack-based buffer overflow in the ast_uri_encode function in main/utils.c in Asterisk Open Source before 1.4.38.1, 1.4.39.1, 1.6.1.21, 1.6.2.15.1, 1.6.2.16.1, 1.8.1.2, 1.8.2.; and Business Edition before C.3.6.2; when running in pedantic mode allows remote authenticated users to execute arbitrary code via crafted caller ID data in vectors involving the (1) SIP channel driver, (2) URIENCODE dialplan function, or (3) AGI dialplan function.
6.0
2007-03-07 CVE-2007-1306 Remote Denial of Service vulnerability in Asterisk SIP Channel Driver
Asterisk 1.4 before 1.4.1 and 1.2 before 1.2.16 allows remote attackers to cause a denial of service (crash) by sending a Session Initiation Protocol (SIP) packet without a URI and SIP-version header, which results in a NULL pointer dereference.
network
low complexity
digium
7.8
2006-10-23 CVE-2006-5444 Remote Buffer Overflow vulnerability in Asterisk Chan_Skinny
Integer overflow in the get_input function in the Skinny channel driver (chan_skinny.c) in Asterisk 1.0.x before 1.0.12 and 1.2.x before 1.2.13, as used by Cisco SCCP phones, allows remote attackers to execute arbitrary code via a certain dlen value that passes a signed integer comparison and leads to a heap-based buffer overflow.
network
low complexity
digium
7.5