CVE-2011-0495

Stack-based buffer overflow in the ast_uri_encode function in main/utils.c in Asterisk Open Source before 1.4.38.1, 1.4.39.1, 1.6.1.21, 1.6.2.15.1, 1.6.2.16.1, 1.8.1.2, 1.8.2.; and Business Edition before C.3.6.2; when running in pedantic mode allows remote authenticated users to execute arbitrary code via crafted caller ID data in vectors involving the (1) SIP channel driver, (2) URIENCODE dialplan function, or (3) AGI dialplan function.
References
Link Resource
http://downloads.asterisk.org/pub/security/AST-2011-001-1.6.2.diff Patch Vendor Advisory
http://downloads.asterisk.org/pub/security/AST-2011-001.html Vendor Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053689.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053713.html Third Party Advisory
http://osvdb.org/70518 Broken Link
http://secunia.com/advisories/42935 Third Party Advisory
http://secunia.com/advisories/43119 Third Party Advisory
http://secunia.com/advisories/43373 Third Party Advisory
http://www.debian.org/security/2011/dsa-2171 Third Party Advisory
http://www.securityfocus.com/archive/1/515781/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/45839 Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2011/0159 Permissions Required
http://www.vupen.com/english/advisories/2011/0281 Permissions Required
http://www.vupen.com/english/advisories/2011/0449 Permissions Required
https://exchange.xforce.ibmcloud.com/vulnerabilities/64831 Third Party Advisory VDB Entry
http://downloads.asterisk.org/pub/security/AST-2011-001-1.6.2.diff Patch Vendor Advisory
http://downloads.asterisk.org/pub/security/AST-2011-001.html Vendor Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053689.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053713.html Third Party Advisory
http://osvdb.org/70518 Broken Link
http://secunia.com/advisories/42935 Third Party Advisory
http://secunia.com/advisories/43119 Third Party Advisory
http://secunia.com/advisories/43373 Third Party Advisory
http://www.debian.org/security/2011/dsa-2171 Third Party Advisory
http://www.securityfocus.com/archive/1/515781/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/45839 Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2011/0159 Permissions Required
http://www.vupen.com/english/advisories/2011/0281 Permissions Required
http://www.vupen.com/english/advisories/2011/0449 Permissions Required
https://exchange.xforce.ibmcloud.com/vulnerabilities/64831 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:digium:asterisk:*:*:*:*:business:*:*:*
cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisknow:1.5:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:digium:s800i_firmware:1.2.0:*:*:*:*:*:*:*
cpe:2.3:h:digium:s800i:-:*:*:*:*:*:*:*

History

21 Nov 2024, 01:24

Type Values Removed Values Added
References () http://downloads.asterisk.org/pub/security/AST-2011-001-1.6.2.diff - Patch, Vendor Advisory () http://downloads.asterisk.org/pub/security/AST-2011-001-1.6.2.diff - Patch, Vendor Advisory
References () http://downloads.asterisk.org/pub/security/AST-2011-001.html - Vendor Advisory () http://downloads.asterisk.org/pub/security/AST-2011-001.html - Vendor Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053689.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053689.html - Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053713.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053713.html - Third Party Advisory
References () http://osvdb.org/70518 - Broken Link () http://osvdb.org/70518 - Broken Link
References () http://secunia.com/advisories/42935 - Third Party Advisory () http://secunia.com/advisories/42935 - Third Party Advisory
References () http://secunia.com/advisories/43119 - Third Party Advisory () http://secunia.com/advisories/43119 - Third Party Advisory
References () http://secunia.com/advisories/43373 - Third Party Advisory () http://secunia.com/advisories/43373 - Third Party Advisory
References () http://www.debian.org/security/2011/dsa-2171 - Third Party Advisory () http://www.debian.org/security/2011/dsa-2171 - Third Party Advisory
References () http://www.securityfocus.com/archive/1/515781/100/0/threaded - Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/515781/100/0/threaded - Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/45839 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/45839 - Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2011/0159 - Permissions Required () http://www.vupen.com/english/advisories/2011/0159 - Permissions Required
References () http://www.vupen.com/english/advisories/2011/0281 - Permissions Required () http://www.vupen.com/english/advisories/2011/0281 - Permissions Required
References () http://www.vupen.com/english/advisories/2011/0449 - Permissions Required () http://www.vupen.com/english/advisories/2011/0449 - Permissions Required
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/64831 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/64831 - Third Party Advisory, VDB Entry

Information

Published : 2011-01-20 19:00

Updated : 2024-11-21 01:24


NVD link : CVE-2011-0495

Mitre link : CVE-2011-0495

CVE.ORG link : CVE-2011-0495


JSON object : View

Products Affected

digium

  • s800i
  • asterisk
  • s800i_firmware
  • asterisknow

debian

  • debian_linux

fedoraproject

  • fedora
CWE
CWE-787

Out-of-bounds Write