First published: Tue Apr 18 2006(Updated: )
Integer signedness error in format_jpeg.c in Asterisk 1.2.6 and earlier allows remote attackers to execute arbitrary code via a length value that passes a length check as a negative number, but triggers a buffer overflow when it is used as an unsigned length.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asterisk | =0.4 | |
Asterisk | =1.2.0_beta1 | |
Asterisk | <=1.2.6 | |
Asterisk | =0.7.1 | |
Asterisk | =0.1.9 | |
Asterisk | =0.2.0 | |
Asterisk | =0.1.3 | |
Asterisk | =0.3.0 | |
Asterisk | =0.7.2 | |
Asterisk | =0.5.0 | |
Asterisk | =0.2 | |
Asterisk | =1.0.9 | |
Asterisk | =1.0.2 | |
Asterisk | =0.1.11 | |
Asterisk | =1.0_rc2 | |
Asterisk | =0.1.6 | |
Asterisk | =0.1.9.1 | |
Asterisk | =1.0.1 | |
Asterisk | =1.0.3 | |
Asterisk | =1.0.5 | |
Asterisk | =0.1.8 | |
Asterisk | =0.1.12 | |
Asterisk | =1.0.6 | |
Asterisk | =0.1.0 | |
Asterisk | =0.1.7 | |
Asterisk | =1.0.4 | |
Asterisk | =1.0.8 | |
Asterisk | =0.1.1 | |
Asterisk | =0.1.2 | |
Asterisk | =0.1.4 | |
Asterisk | =1.0.0 | |
Asterisk | =1.0.7 | |
Asterisk | =0.7.0 | |
Asterisk | =0.1.5 | |
Asterisk | =0.3 | |
Asterisk | =0.4.0 | |
Asterisk | =0.1.10 | |
Asterisk | =1.0_rc1 |
http://www.cipher.org.uk/index.php?p=advisories/Asterisk_Codec_Integer_Overflow_07-04-2006.advisory
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1827 is considered a critical vulnerability as it allows remote code execution.
To fix CVE-2006-1827, update Asterisk to version 1.2.7 or later.
CVE-2006-1827 affects Asterisk versions up to and including 1.2.6.
Yes, CVE-2006-1827 can be exploited remotely by attackers.
CVE-2006-1827 is an integer signedness error leading to a buffer overflow.