← Voltar para CVEs
CVE-2011-0495
N/ADescricao
Stack-based buffer overflow in the ast_uri_encode function in main/utils.c in Asterisk Open Source before 1.4.38.1, 1.4.39.1, 1.6.1.21, 1.6.2.15.1, 1.6.2.16.1, 1.8.1.2, 1.8.2.; and Business Edition before C.3.6.2; when running in pedantic mode allows remote authenticated users to execute arbitrary code via crafted caller ID data in vectors involving the (1) SIP channel driver, (2) URIENCODE dialplan function, or (3) AGI dialplan function.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado1/20/2011
Ultima modificacao4/29/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
debian:debian_linuxdigium:asteriskdigium:asterisknowdigium:s800idigium:s800i_firmwarefedoraproject:fedora
Fraquezas (CWE)
CWE-787
Referencias
http://downloads.asterisk.org/pub/security/AST-2011-001.html(cve@mitre.org)
http://osvdb.org/70518(cve@mitre.org)
http://secunia.com/advisories/42935(cve@mitre.org)
http://secunia.com/advisories/43119(cve@mitre.org)
http://secunia.com/advisories/43373(cve@mitre.org)
http://www.debian.org/security/2011/dsa-2171(cve@mitre.org)
http://www.securityfocus.com/archive/1/515781/100/0/threaded(cve@mitre.org)
http://www.securityfocus.com/bid/45839(cve@mitre.org)
http://www.vupen.com/english/advisories/2011/0159(cve@mitre.org)
http://www.vupen.com/english/advisories/2011/0281(cve@mitre.org)
http://www.vupen.com/english/advisories/2011/0449(cve@mitre.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/64831(cve@mitre.org)
http://downloads.asterisk.org/pub/security/AST-2011-001-1.6.2.diff(af854a3a-2127-422b-91ae-364da2661108)
http://downloads.asterisk.org/pub/security/AST-2011-001.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053689.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053713.html(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/70518(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/42935(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/43119(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/43373(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2011/dsa-2171(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/515781/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/45839(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2011/0159(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2011/0281(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2011/0449(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/64831(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.