CVE-2011-0495
Published Jan 20, 2011
Last updated 4 years ago
Overview
- Description
- Stack-based buffer overflow in the ast_uri_encode function in main/utils.c in Asterisk Open Source before 1.4.38.1, 1.4.39.1, 1.6.1.21, 1.6.2.15.1, 1.6.2.16.1, 1.8.1.2, 1.8.2.; and Business Edition before C.3.6.2; when running in pedantic mode allows remote authenticated users to execute arbitrary code via crafted caller ID data in vectors involving the (1) SIP channel driver, (2) URIENCODE dialplan function, or (3) AGI dialplan function.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6
- Impact score
- 6.4
- Exploitability score
- 6.8
- Vector string
- AV:N/AC:M/Au:S/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-787
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:business:*:*:*", "vulnerable": true, "matchCriteriaId": "FA6C77B1-85FF-47C1-8E1F-CABFF1DEA5FE", "versionEndExcluding": "c.3.6.2" }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4CF68F51-2011-4CEE-A4EA-49A59E440BAA", "versionEndIncluding": "1.2.40", "versionStartIncluding": "1.2.0" }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F0CCB255-0F1A-4FBE-A04D-A9560D3DF3BE", "versionEndExcluding": "1.4.38.1", "versionStartIncluding": "1.4.0" }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3CEB89D-1D84-4B8E-B476-E00726752766", "versionEndExcluding": "1.4.39.1", "versionStartIncluding": "1.4.39" }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C0F92DAC-5736-49A6-9C52-2330BC4B724B", "versionEndExcluding": "1.6.1.21", "versionStartIncluding": "1.6.1" }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "71755241-9AF8-43EE-BD9F-9FF4DFD808D4", "versionEndExcluding": "1.6.2.15.1", "versionStartIncluding": "1.6.2" }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "007C363A-CBC6-4A05-BD3E-74A5A530B281", "versionEndExcluding": "1.6.2.16.1", "versionStartIncluding": "1.6.2.16" }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "35488043-2E09-4286-A178-4A25AA5C364F", "versionEndExcluding": "1.8.1.2", "versionStartIncluding": "1.8.0" }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AADFA817-D1C7-49D2-AE6D-55493145BAFF", "versionEndExcluding": "1.8.2.2", "versionStartIncluding": "1.8.2" }, { "criteria": "cpe:2.3:a:digium:asterisknow:1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF81215F-0DD3-48FC-BA1C-19E42FCD47B5" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2D59BD0-43DE-4E58-A057-640AB98359A6" }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BDE52846-24EC-4068-B788-EC7F915FFF11" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:digium:s800i_firmware:1.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8AA18EB6-92D5-4B01-A4BC-2B7177D28C40" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:digium:s800i:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "15C35F93-0E57-4AEB-AA5F-4EDFAE753451" } ], "operator": "OR" } ], "operator": "AND" } ]