CVE-2011-0495 — Out-of-bounds Write in Asterisk
Severity
6.0MEDIUMNVD
EPSS
0.6%
top 31.27%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 20
Latest updateMay 13
Description
Stack-based buffer overflow in the ast_uri_encode function in main/utils.c in Asterisk Open Source before 1.4.38.1, 1.4.39.1, 1.6.1.21, 1.6.2.15.1, 1.6.2.16.1, 1.8.1.2, 1.8.2.; and Business Edition before C.3.6.2; when running in pedantic mode allows remote authenticated users to execute arbitrary code via crafted caller ID data in vectors involving the (1) SIP channel driver, (2) URIENCODE dialplan function, or (3) AGI dialplan function.
CVSS vector
AV:N/AC:M/C:P/I:P/A:PExploitability: 6.8 | Impact: 6.4
Affected Packages5 packages
Also affects: Debian Linux 6.0, Fedora 13, 14
Patches
🔴Vulnerability Details
2📋Vendor Advisories
1Debian▶
CVE-2011-0495: asterisk - Stack-based buffer overflow in the ast_uri_encode function in main/utils.c in As...↗2011
💬Community
2Bugzilla▶
CVE-2011-0495 Asterisk: Stack-based buffer overflow by forming an outgoing SIP request with specially-crafted caller ID information (AST-2011-001)↗2011-01-19
Bugzilla▶
CVE-2011-0495 Asterisk: Stack-based buffer overflow by forming an outgoing SIP request with specially-crafted caller ID information (AST-2011-001) [fedora-all]↗2011-01-19