← Volver a CVEs
CVE-2011-0495
N/ADescripcion
Stack-based buffer overflow in the ast_uri_encode function in main/utils.c in Asterisk Open Source before 1.4.38.1, 1.4.39.1, 1.6.1.21, 1.6.2.15.1, 1.6.2.16.1, 1.8.1.2, 1.8.2.; and Business Edition before C.3.6.2; when running in pedantic mode allows remote authenticated users to execute arbitrary code via crafted caller ID data in vectors involving the (1) SIP channel driver, (2) URIENCODE dialplan function, or (3) AGI dialplan function.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado1/20/2011
Ultima modificacion4/29/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
debian:debian_linuxdigium:asteriskdigium:asterisknowdigium:s800idigium:s800i_firmwarefedoraproject:fedora
Debilidades (CWE)
CWE-787
Referencias
http://downloads.asterisk.org/pub/security/AST-2011-001.html(cve@mitre.org)
http://osvdb.org/70518(cve@mitre.org)
http://secunia.com/advisories/42935(cve@mitre.org)
http://secunia.com/advisories/43119(cve@mitre.org)
http://secunia.com/advisories/43373(cve@mitre.org)
http://www.debian.org/security/2011/dsa-2171(cve@mitre.org)
http://www.securityfocus.com/archive/1/515781/100/0/threaded(cve@mitre.org)
http://www.securityfocus.com/bid/45839(cve@mitre.org)
http://www.vupen.com/english/advisories/2011/0159(cve@mitre.org)
http://www.vupen.com/english/advisories/2011/0281(cve@mitre.org)
http://www.vupen.com/english/advisories/2011/0449(cve@mitre.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/64831(cve@mitre.org)
http://downloads.asterisk.org/pub/security/AST-2011-001-1.6.2.diff(af854a3a-2127-422b-91ae-364da2661108)
http://downloads.asterisk.org/pub/security/AST-2011-001.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053689.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053713.html(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/70518(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/42935(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/43119(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/43373(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2011/dsa-2171(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/515781/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/45839(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2011/0159(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2011/0281(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2011/0449(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/64831(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.