CVE-2006-2898

NameCVE-2006-2898
DescriptionThe IAX2 channel driver (chan_iax2) for Asterisk 1.2.x before 1.2.9 and 1.0.x before 1.0.11 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via truncated IAX 2 (IAX2) video frames, which bypasses a length check and leads to a buffer overflow involving negative length check. NOTE: the vendor advisory claims that only a DoS is possible, but the original researcher is reliable.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-1126
Debian Bugs380054

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
asterisk (PTS)buster1:16.2.1~dfsg-1+deb10u2fixed
buster (security)1:16.28.0~dfsg-0+deb10u4fixed
bullseye1:16.28.0~dfsg-0+deb11u3fixed
bullseye (security)1:16.28.0~dfsg-0+deb11u4fixed
sid1:20.6.0~dfsg+~cs6.13.40431414-2fixed
iaxmodem (PTS)buster1.2.0~dfsg-3fixed
sid, trixie, bookworm, bullseye1.2.0~dfsg-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
asterisksourcesarge1:1.0.7.dfsg.1-2sarge3DSA-1126
asterisksource(unstable)1:1.2.10.dfsg-2380054
iaxsourcesarge(not affected)
iaxsource(unstable)0.2.2-5
iaxmodemsource(unstable)0.1.8.dfsg-2

Notes

[sarge] - iax <not-affected> (Vulnerable code not present)

Search for package or bug name: Reporting problems