CVE-2006-2923

The iax_net_read function in the iaxclient open source library, as used in multiple products including (a) LoudHush 1.3.6, (b) IDE FISK 1.35 and earlier, (c) Kiax 0.8.5 and earlier, (d) DIAX, (e) Ziaxphone, (f) IAX Phone, (g) X-lite, (h) MediaX, (i) Extreme Networks ePhone, and (j) iaxComm before 1.2.0, allows remote attackers to execute arbitrary code via crafted IAX 2 (IAX2) packets with truncated (1) full frames or (2) mini-frames, which are detected in a length check but still processed, leading to buffer overflows related to negative length values.
References
Link Resource
http://iaxclient.sourceforge.net/iaxcomm/
http://secunia.com/advisories/20466 Patch Vendor Advisory
http://secunia.com/advisories/20560 Vendor Advisory
http://secunia.com/advisories/20567 Vendor Advisory
http://secunia.com/advisories/20623 Vendor Advisory
http://secunia.com/advisories/20900 Vendor Advisory
http://sourceforge.net/project/shownotes.php?release_id=423099&group_id=131960
http://www.coresecurity.com/common/showdoc.php?idx=548&idxseccion=10
http://www.gentoo.org/security/en/glsa/glsa-200606-30.xml
http://www.loudhush.ro/changelog.txt
http://www.securityfocus.com/archive/1/436638/100/0/threaded
http://www.securityfocus.com/bid/18307 Patch
http://www.vupen.com/english/advisories/2006/2180 Vendor Advisory
http://www.vupen.com/english/advisories/2006/2284 Vendor Advisory
http://www.vupen.com/english/advisories/2006/2285 Vendor Advisory
http://www.vupen.com/english/advisories/2006/2286 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/27047
http://iaxclient.sourceforge.net/iaxcomm/
http://secunia.com/advisories/20466 Patch Vendor Advisory
http://secunia.com/advisories/20560 Vendor Advisory
http://secunia.com/advisories/20567 Vendor Advisory
http://secunia.com/advisories/20623 Vendor Advisory
http://secunia.com/advisories/20900 Vendor Advisory
http://sourceforge.net/project/shownotes.php?release_id=423099&group_id=131960
http://www.coresecurity.com/common/showdoc.php?idx=548&idxseccion=10
http://www.gentoo.org/security/en/glsa/glsa-200606-30.xml
http://www.loudhush.ro/changelog.txt
http://www.securityfocus.com/archive/1/436638/100/0/threaded
http://www.securityfocus.com/bid/18307 Patch
http://www.vupen.com/english/advisories/2006/2180 Vendor Advisory
http://www.vupen.com/english/advisories/2006/2284 Vendor Advisory
http://www.vupen.com/english/advisories/2006/2285 Vendor Advisory
http://www.vupen.com/english/advisories/2006/2286 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/27047
Configurations

Configuration 1 (hide)

cpe:2.3:a:loudhush:loudhush:1.3.6:*:*:*:*:*:*:*

History

21 Nov 2024, 00:12

Type Values Removed Values Added
References () http://iaxclient.sourceforge.net/iaxcomm/ - () http://iaxclient.sourceforge.net/iaxcomm/ -
References () http://secunia.com/advisories/20466 - Patch, Vendor Advisory () http://secunia.com/advisories/20466 - Patch, Vendor Advisory
References () http://secunia.com/advisories/20560 - Vendor Advisory () http://secunia.com/advisories/20560 - Vendor Advisory
References () http://secunia.com/advisories/20567 - Vendor Advisory () http://secunia.com/advisories/20567 - Vendor Advisory
References () http://secunia.com/advisories/20623 - Vendor Advisory () http://secunia.com/advisories/20623 - Vendor Advisory
References () http://secunia.com/advisories/20900 - Vendor Advisory () http://secunia.com/advisories/20900 - Vendor Advisory
References () http://sourceforge.net/project/shownotes.php?release_id=423099&group_id=131960 - () http://sourceforge.net/project/shownotes.php?release_id=423099&group_id=131960 -
References () http://www.coresecurity.com/common/showdoc.php?idx=548&idxseccion=10 - () http://www.coresecurity.com/common/showdoc.php?idx=548&idxseccion=10 -
References () http://www.gentoo.org/security/en/glsa/glsa-200606-30.xml - () http://www.gentoo.org/security/en/glsa/glsa-200606-30.xml -
References () http://www.loudhush.ro/changelog.txt - () http://www.loudhush.ro/changelog.txt -
References () http://www.securityfocus.com/archive/1/436638/100/0/threaded - () http://www.securityfocus.com/archive/1/436638/100/0/threaded -
References () http://www.securityfocus.com/bid/18307 - Patch () http://www.securityfocus.com/bid/18307 - Patch
References () http://www.vupen.com/english/advisories/2006/2180 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/2180 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2006/2284 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/2284 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2006/2285 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/2285 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2006/2286 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/2286 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/27047 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/27047 -

Information

Published : 2006-06-09 10:02

Updated : 2024-11-21 00:12


NVD link : CVE-2006-2923

Mitre link : CVE-2006-2923

CVE.ORG link : CVE-2006-2923


JSON object : View

Products Affected

loudhush

  • loudhush
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer