Integer signedness error in format_jpeg.c in Asterisk 1.2.6 and earlier allows remote attackers to execute arbitrary code via a length value that passes a length check as a negative number, but triggers a buffer overflow when it is used as an unsigned length.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DSA-1048-1 | New Asterisk packages fix arbitrary code execution |
![]() |
EUVD-2006-1827 | Integer signedness error in format_jpeg.c in Asterisk 1.2.6 and earlier allows remote attackers to execute arbitrary code via a length value that passes a length check as a negative number, but triggers a buffer overflow when it is used as an unsigned length. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T17:27:29.111Z
Reserved: 2006-04-18T00:00:00
Link: CVE-2006-1827

No data.

Status : Deferred
Published: 2006-04-18T20:02:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2006-1827

No data.

No data.