Vulnerability Description
Stack-based buffer overflow in the ast_parse_digest function in main/utils.c in Asterisk 1.8.x before 1.8.10.1 and 10.x before 10.2.1 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string in an HTTP Digest Authentication header.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Digium | Asterisk | 1.8.0 |
Related Weaknesses (CWE)
References
- http://downloads.asterisk.org/pub/security/AST-2012-003-1.8.diff
- http://downloads.asterisk.org/pub/security/AST-2012-003.pdfVendor Advisory
- http://osvdb.org/80126
- http://secunia.com/advisories/48417Vendor Advisory
- http://www.asterisk.org/node/51797Vendor Advisory
- http://www.openwall.com/lists/oss-security/2012/03/16/10
- http://www.openwall.com/lists/oss-security/2012/03/16/17
- http://www.securitytracker.com/id?1026813
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74083
- http://downloads.asterisk.org/pub/security/AST-2012-003-1.8.diff
- http://downloads.asterisk.org/pub/security/AST-2012-003.pdfVendor Advisory
- http://osvdb.org/80126
- http://secunia.com/advisories/48417Vendor Advisory
- http://www.asterisk.org/node/51797Vendor Advisory
- http://www.openwall.com/lists/oss-security/2012/03/16/10
FAQ
What is CVE-2012-1184?
CVE-2012-1184 is a vulnerability with a CVSS score of 7.5 (HIGH). Stack-based buffer overflow in the ast_parse_digest function in main/utils.c in Asterisk 1.8.x before 1.8.10.1 and 10.x before 10.2.1 allows remote attackers to cause a denial of service (crash) or po...
How severe is CVE-2012-1184?
CVE-2012-1184 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-1184?
Check the references section above for vendor advisories and patch information. Affected products include: Digium Asterisk.