Stack-based buffer overflow in Asterisk Open Source - CVE-2012-1183
Published: September 18, 2012 / Updated: March 10, 2023
Asterisk Open Source
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the milliwatt_generate function in the Miliwatt application when processing a large number of samples in an audio packet. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
How to mitigate CVE-2012-1183
Sources
- http://archives.neohapsis.com/archives/bugtraq/2012-03/0069.html
- http://downloads.asterisk.org/pub/security/AST-2012-002.pdf
- http://downloads.asterisk.org/pub/security/AST-2012-002-1.8.diff
- http://osvdb.org/80125
- http://secunia.com/advisories/48417
- http://secunia.com/advisories/48941
- http://securitytracker.com/id?1026812
- http://www.asterisk.org/node/51797
- http://www.debian.org/security/2012/dsa-2460
- http://www.openwall.com/lists/oss-security/2012/03/16/10
- http://www.openwall.com/lists/oss-security/2012/03/16/17
- http://www.securityfocus.com/bid/52523
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74082