CVE-2011-1147Improper Restriction of Operations within the Bounds of a Memory Buffer in Asterisk

Severity
6.8MEDIUMNVD
EPSS
3.4%
top 12.53%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 15
Latest updateMay 17

Description

Multiple stack-based and heap-based buffer overflows in the (1) decode_open_type and (2) udptl_rx_packet functions in main/udptl.c in Asterisk Open Source 1.4.x before 1.4.39.2, 1.6.1.x before 1.6.1.22, 1.6.2.x before 1.6.2.16.2, and 1.8 before 1.8.2.4; Business Edition C.x.x before C.3.6.3; AsteriskNOW 1.5; and s800i (Asterisk Appliance), when T.38 support is enabled, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UDPTL packet.

CVSS vector

AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4

Affected Packages4 packages

debiandebian/asterisk< asterisk 1:1.8.3.3-1 (bullseye)
Debiandigium/asterisk< 1:1.8.3.3-1
NVDdigium/asterisk110 versions+109

Patches

🔴Vulnerability Details

2
GHSA
GHSA-747x-cf7f-hf5f: Multiple stack-based and heap-based buffer overflows in the (1) decode_open_type and (2) udptl_rx_packet functions in main/udptl2022-05-17
OSV
CVE-2011-1147: Multiple stack-based and heap-based buffer overflows in the (1) decode_open_type and (2) udptl_rx_packet functions in main/udptl2011-03-15

📋Vendor Advisories

1
Debian
CVE-2011-1147: asterisk - Multiple stack-based and heap-based buffer overflows in the (1) decode_open_type...2011

💬Community

2
Bugzilla
CVE-2011-0495 Asterisk: Stack-based buffer overflow by forming an outgoing SIP request with specially-crafted caller ID information (AST-2011-001)2011-01-19
Bugzilla
CVE-2011-0495 Asterisk: Stack-based buffer overflow by forming an outgoing SIP request with specially-crafted caller ID information (AST-2011-001) [fedora-all]2011-01-19