CVE-2005-2081

Stack-based buffer overflow in the function that parses commands in Asterisk 1.0.7, when the 'write = command' option is enabled, allows remote attackers to execute arbitrary code via a command that has two double quotes followed by a tab character.
Configurations

Configuration 1 (hide)

cpe:2.3:a:digium:asterisk:1.0.7:*:*:*:*:*:*:*

History

20 Nov 2024, 23:58

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=111946399501080&w=2 - () http://marc.info/?l=bugtraq&m=111946399501080&w=2 -
References () http://www.portcullis-security.com/advisory/advisory-05-013.txt - Vendor Advisory () http://www.portcullis-security.com/advisory/advisory-05-013.txt - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/21115 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/21115 -

Information

Published : 2005-07-05 04:00

Updated : 2024-11-20 23:58


NVD link : CVE-2005-2081

Mitre link : CVE-2005-2081

CVE.ORG link : CVE-2005-2081


JSON object : View

Products Affected

digium

  • asterisk