#VU32804 Stack-based buffer overflow in Asterisk Open Source - CVE-2012-1184
Published: September 18, 2012 / Updated: July 29, 2020
Asterisk Open Source
Digium (Linux Support Services)
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the ast_parse_digest function in main/utils.c when processing a long string in an HTTP Digest Authentication header. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://downloads.asterisk.org/pub/security/AST-2012-003.pdf
- http://downloads.asterisk.org/pub/security/AST-2012-003-1.8.diff
- http://osvdb.org/80126
- http://secunia.com/advisories/48417
- http://www.asterisk.org/node/51797
- http://www.openwall.com/lists/oss-security/2012/03/16/10
- http://www.openwall.com/lists/oss-security/2012/03/16/17
- http://www.securitytracker.com/id?1026813
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74083