Description
Stack-based buffer overflow in the ast_uri_encode function in main/utils.c in Asterisk Open Source before 1.4.38.1, 1.4.39.1, 1.6.1.21, 1.6.2.15.1, 1.6.2.16.1, 1.8.1.2, 1.8.2.; and Business Edition before C.3.6.2; when running in pedantic mode allows remote authenticated users to execute arbitrary code via crafted caller ID data in vectors involving the (1) SIP channel driver, (2) URIENCODE dialplan function, or (3) AGI dialplan function.
Published: 2011-01-20
Score: 6.0 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-2171-1 asterisk security update
EUVD EUVD EUVD-2011-0515 Stack-based buffer overflow in the ast_uri_encode function in main/utils.c in Asterisk Open Source before 1.4.38.1, 1.4.39.1, 1.6.1.21, 1.6.2.15.1, 1.6.2.16.1, 1.8.1.2, 1.8.2.; and Business Edition before C.3.6.2; when running in pedantic mode allows remote authenticated users to execute arbitrary code via crafted caller ID data in vectors involving the (1) SIP channel driver, (2) URIENCODE dialplan function, or (3) AGI dialplan function.
History

No history.

Subscriptions

Debian Debian Linux
Digium Asterisk Asterisknow S800i S800i Firmware
Fedoraproject Fedora
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T21:58:24.451Z

Reserved: 2011-01-19T00:00:00.000Z

Link: CVE-2011-0495

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2011-01-20T19:00:08.600

Modified: 2025-04-11T00:51:21.963

Link: CVE-2011-0495

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses