Vulnerability Description
Stack-based buffer overflow in the function that parses commands in Asterisk 1.0.7, when the 'write = command' option is enabled, allows remote attackers to execute arbitrary code via a command that has two double quotes followed by a tab character.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Digium | Asterisk | 1.0.7 |
References
- http://marc.info/?l=bugtraq&m=111946399501080&w=2
- http://www.portcullis-security.com/advisory/advisory-05-013.txtVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/21115
- http://marc.info/?l=bugtraq&m=111946399501080&w=2
- http://www.portcullis-security.com/advisory/advisory-05-013.txtVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/21115
FAQ
What is CVE-2005-2081?
CVE-2005-2081 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Stack-based buffer overflow in the function that parses commands in Asterisk 1.0.7, when the 'write = command' option is enabled, allows remote attackers to execute arbitrary code via a command that h...
How severe is CVE-2005-2081?
CVE-2005-2081 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-2081?
Check the references section above for vendor advisories and patch information. Affected products include: Digium Asterisk.