[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96125

 
 

909

 
 

78020

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2006-2923

Date: (C)2006-06-09   (M)2017-07-21
 
CVSS Score: 6.4Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 4.9Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: NONE











The iax_net_read function in the iaxclient open source library, as used in multiple products including (a) LoudHush 1.3.6, (b) IDE FISK 1.35 and earlier, (c) Kiax 0.8.5 and earlier, (d) DIAX, (e) Ziaxphone, (f) IAX Phone, (g) X-lite, (h) MediaX, (i) Extreme Networks ePhone, and (j) iaxComm before 1.2.0, allows remote attackers to execute arbitrary code via crafted IAX 2 (IAX2) packets with truncated (1) full frames or (2) mini-frames, which are detected in a length check but still processed, leading to buffer overflows related to negative length values.

Reference:
BID-18307
http://www.securityfocus.com/archive/1/archive/1/436638/100/0/threaded
SECUNIA-20466
SECUNIA-20560
SECUNIA-20567
SECUNIA-20623
SECUNIA-20900
ADV-2006-2180
ADV-2006-2284
ADV-2006-2285
ADV-2006-2286
GLSA-200606-30
http://iaxclient.sourceforge.net/iaxcomm/
http://sourceforge.net/project/shownotes.php?release_id=423099&group_id=131960
http://www.coresecurity.com/common/showdoc.php?idx=548&idxseccion=10
http://www.loudhush.ro/changelog.txt
iaxclient-truncated-frame-bo(27047)

CWE    1
CWE-119

© 2013 SecPod Technologies