CVE-2006-2898

NameCVE-2006-2898
DescriptionThe IAX2 channel driver (chan_iax2) for Asterisk 1.2.x before 1.2.9 and 1.0.x before 1.0.11 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via truncated IAX 2 (IAX2) video frames, which bypasses a length check and leads to a buffer overflow involving negative length check. NOTE: the vendor advisory claims that only a DoS is possible, but the original researcher is reliable.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-1126
NVD severityhigh
Debian Bugs380054

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
asterisk (PTS)jessie1:11.13.1~dfsg-2+deb8u5fixed
jessie (security)1:11.13.1~dfsg-2+deb8u6fixed
stretch (security), stretch1:13.14.1~dfsg-2+deb9u4fixed
buster1:16.2.1~dfsg-1+deb10u1fixed
bullseye, sid1:16.2.1~dfsg-2fixed
iaxmodem (PTS)jessie, stretch1.2.0~dfsg-2fixed
buster, bullseye, sid1.2.0~dfsg-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
asterisksource(unstable)1:1.2.10.dfsg-2380054
asterisksourcesarge1:1.0.7.dfsg.1-2sarge3DSA-1126
iaxsource(unstable)0.2.2-5
iaxsourcesarge(not affected)
iaxmodemsource(unstable)0.1.8.dfsg-2

Notes

[sarge] - iax <not-affected> (Vulnerable code not present)

Search for package or bug name: Reporting problems