[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2006-2923Date: (C)2006-06-09   (M)2023-12-22


The iax_net_read function in the iaxclient open source library, as used in multiple products including (a) LoudHush 1.3.6, (b) IDE FISK 1.35 and earlier, (c) Kiax 0.8.5 and earlier, (d) DIAX, (e) Ziaxphone, (f) IAX Phone, (g) X-lite, (h) MediaX, (i) Extreme Networks ePhone, and (j) iaxComm before 1.2.0, allows remote attackers to execute arbitrary code via crafted IAX 2 (IAX2) packets with truncated (1) full frames or (2) mini-frames, which are detected in a length check but still processed, leading to buffer overflows related to negative length values.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 6.4
Exploit Score: 10.0
Impact Score: 4.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: NONE
  
Reference:
BID-18307
http://www.securityfocus.com/archive/1/archive/1/436638/100/0/threaded
SECUNIA-20466
SECUNIA-20560
SECUNIA-20567
SECUNIA-20623
SECUNIA-20900
ADV-2006-2180
ADV-2006-2284
ADV-2006-2285
ADV-2006-2286
GLSA-200606-30
http://iaxclient.sourceforge.net/iaxcomm/
http://sourceforge.net/project/shownotes.php?release_id=423099&group_id=131960
http://www.coresecurity.com/common/showdoc.php?idx=548&idxseccion=10
http://www.loudhush.ro/changelog.txt
iaxclient-truncated-frame-bo(27047)

CWE    1
CWE-119

© SecPod Technologies