CVE-2006-1827Improper Restriction of Operations within the Bounds of a Memory Buffer in Asterisk

4 documents4 sources
Severity
6.4MEDIUMNVD
EPSS
3.4%
top 12.60%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 18
Latest updateMay 1

Description

Integer signedness error in format_jpeg.c in Asterisk 1.2.6 and earlier allows remote attackers to execute arbitrary code via a length value that passes a length check as a negative number, but triggers a buffer overflow when it is used as an unsigned length.

CVSS vector

AV:N/AC:L/C:N/I:P/A:PExploitability: 10.0 | Impact: 4.9

Affected Packages3 packages

debiandebian/asterisk< asterisk 1:1.2.7.1.dfsg-1 (bullseye)
Debiandigium/asterisk< 1:1.2.7.1.dfsg-1
NVDdigium/asterisk1.2.6+37

Patches

🔴Vulnerability Details

2
GHSA
GHSA-3jff-hq38-gfvf: Integer signedness error in format_jpeg2022-05-01
OSV
CVE-2006-1827: Integer signedness error in format_jpeg2006-04-18

📋Vendor Advisories

1
Debian
CVE-2006-1827: asterisk - Integer signedness error in format_jpeg.c in Asterisk 1.2.6 and earlier allows r...2006