CVE-2012-1184

Stack-based buffer overflow in the ast_parse_digest function in main/utils.c in Asterisk 1.8.x before 1.8.10.1 and 10.x before 10.2.1 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string in an HTTP Digest Authentication header.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.8.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.8.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.8.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.8.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.8.0:rc4:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.8.0:rc5:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.8.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.8.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.9.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.9.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.9.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.9.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.9.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.9.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.9.3:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.10.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.10.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.10.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.10.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.8.10.0:rc4:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:digium:asterisk:10.0.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:10.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:10.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:10.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:10.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:10.0.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:10.0.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:10.1.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:10.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:10.1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:10.1.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:10.1.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:10.1.3:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:10.2.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:10.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:10.2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:10.2.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:10.2.0:rc4:*:*:*:*:*:*

History

21 Nov 2024, 01:36

Type Values Removed Values Added
References () http://downloads.asterisk.org/pub/security/AST-2012-003-1.8.diff - () http://downloads.asterisk.org/pub/security/AST-2012-003-1.8.diff -
References () http://downloads.asterisk.org/pub/security/AST-2012-003.pdf - Vendor Advisory () http://downloads.asterisk.org/pub/security/AST-2012-003.pdf - Vendor Advisory
References () http://osvdb.org/80126 - () http://osvdb.org/80126 -
References () http://secunia.com/advisories/48417 - Vendor Advisory () http://secunia.com/advisories/48417 - Vendor Advisory
References () http://www.asterisk.org/node/51797 - Vendor Advisory () http://www.asterisk.org/node/51797 - Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2012/03/16/10 - () http://www.openwall.com/lists/oss-security/2012/03/16/10 -
References () http://www.openwall.com/lists/oss-security/2012/03/16/17 - () http://www.openwall.com/lists/oss-security/2012/03/16/17 -
References () http://www.securitytracker.com/id?1026813 - () http://www.securitytracker.com/id?1026813 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/74083 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/74083 -

Information

Published : 2012-09-18 18:55

Updated : 2024-11-21 01:36


NVD link : CVE-2012-1184

Mitre link : CVE-2012-1184

CVE.ORG link : CVE-2012-1184


JSON object : View

Products Affected

digium

  • asterisk
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer