First published: Tue Sep 18 2012(Updated: )
Stack-based buffer overflow in the milliwatt_generate function in the Miliwatt application in Asterisk 1.4.x before 1.4.44, 1.6.x before 1.6.2.23, 1.8.x before 1.8.10.1, and 10.x before 10.2.1, when the o option is used and the internal_timing option is off, allows remote attackers to cause a denial of service (application crash) via a large number of samples in an audio packet.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Asterisk | >=1.4.0<1.4.44 | |
Asterisk | >=1.6.0<1.6.2.23 | |
Asterisk | >=1.8.0<1.8.10.1 | |
Asterisk | >=10.0.0<10.2.1 | |
Debian GNU/Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1183 is classified as a high severity vulnerability due to its ability to cause a denial of service through stack-based buffer overflow.
To mitigate CVE-2012-1183, users should upgrade Asterisk to versions 1.4.44, 1.6.2.23, 1.8.10.1, or 10.2.1 or later.
CVE-2012-1183 affects Asterisk versions prior to 1.4.44, 1.6.2.23, 1.8.10.1, and 10.2.1.
Yes, CVE-2012-1183 can be exploited remotely by attackers if certain configuration options are set.
CVE-2012-1183 can cause a denial of service, impacting the availability of the Asterisk application on affected systems.