CVE-2005-2081Improper Restriction of Operations within the Bounds of a Memory Buffer in Asterisk

4 documents4 sources
Severity
5.0MEDIUMNVD
EPSS
0.3%
top 42.69%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 5
Latest updateMay 1

Description

Stack-based buffer overflow in the function that parses commands in Asterisk 1.0.7, when the 'write = command' option is enabled, allows remote attackers to execute arbitrary code via a command that has two double quotes followed by a tab character.

CVSS vector

AV:N/AC:L/C:N/I:P/A:NExploitability: 10.0 | Impact: 2.9

Affected Packages3 packages

debiandebian/asterisk< asterisk 1:1.0.9.dfsg-1 (bullseye)
Debiandigium/asterisk< 1:1.0.9.dfsg-1
NVDdigium/asterisk1.0.7

🔴Vulnerability Details

2
GHSA
GHSA-v2qj-hcwh-p8h2: Stack-based buffer overflow in the function that parses commands in Asterisk 12022-05-01
OSV
CVE-2005-2081: Stack-based buffer overflow in the function that parses commands in Asterisk 12005-07-05

📋Vendor Advisories

1
Debian
CVE-2005-2081: asterisk - Stack-based buffer overflow in the function that parses commands in Asterisk 1.0...2005