CVE-2006-4345Improper Restriction of Operations within the Bounds of a Memory Buffer in Asterisk

4 documents4 sources
Severity
7.5HIGHNVD
EPSS
5.2%
top 10.10%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 24
Latest updateMay 1

Description

Stack-based buffer overflow in channels/chan_mgcp.c in MGCP in Asterisk 1.0 through 1.2.10 allows remote attackers to execute arbitrary code via a crafted audit endpoint (AUEP) response.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages3 packages

debiandebian/asterisk< asterisk 1:1.2.11.dfsg-1 (bullseye)
Debiandigium/asterisk< 1:1.2.11.dfsg-1
NVDdigium/asterisk20 versions+19

Patches

🔴Vulnerability Details

2
GHSA
GHSA-gqh2-528h-q2h8: Stack-based buffer overflow in channels/chan_mgcp2022-05-01
OSV
CVE-2006-4345: Stack-based buffer overflow in channels/chan_mgcp2006-08-24

📋Vendor Advisories

1
Debian
CVE-2006-4345: asterisk - Stack-based buffer overflow in channels/chan_mgcp.c in MGCP in Asterisk 1.0 thro...2006