CVE-2006-2898Improper Restriction of Operations within the Bounds of a Memory Buffer in Asterisk

Severity
7.5HIGHNVD
EPSS
0.3%
top 44.51%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 7
Latest updateMay 1

Description

The IAX2 channel driver (chan_iax2) for Asterisk 1.2.x before 1.2.9 and 1.0.x before 1.0.11 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via truncated IAX 2 (IAX2) video frames, which bypasses a length check and leads to a buffer overflow involving negative length check. NOTE: the vendor advisory claims that only a DoS is possible, but the original researcher is reliable.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages4 packages

debiandebian/asterisk< asterisk 1:1.2.10.dfsg-2 (bullseye)
Debiandigium/asterisk< 1:1.2.10.dfsg-2
NVDdigium/asterisk9 versions+8
debiandebian/iaxmodem< asterisk 1:1.2.10.dfsg-2 (bullseye)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-4f9c-vvfw-m8rr: The IAX2 channel driver (chan_iax2) for Asterisk 12022-05-01
OSV
CVE-2006-2898: The IAX2 channel driver (chan_iax2) for Asterisk 12006-06-07

📋Vendor Advisories

1
Debian
CVE-2006-2898: asterisk - The IAX2 channel driver (chan_iax2) for Asterisk 1.2.x before 1.2.9 and 1.0.x be...2006