cpe:/a:digium:asterisk:1.0.7 cpe:/a:digium:asterisk:1.0.8 cpe:/a:digium:asterisk:1.0.9 cpe:/a:digium:asterisk:1.0.10 cpe:/a:digium:asterisk:1.2.0_beta1 cpe:/a:digium:asterisk:1.2.0_beta2 cpe:/a:digium:asterisk:1.2.6 cpe:/a:digium:asterisk:1.2.7 cpe:/a:digium:asterisk:1.2.8 CVE-2006-2898 2006-06-02T00:00:00.000-04:00 2006-06-07T06:02:00.000-04:00 2017-07-19T21:31:52.227-04:00 7.5 NETWORK LOW NONE PARTIAL PARTIAL PARTIAL http://nvd.nist.gov 2006-06-07T16:33:00.000-04:00 ALLOWS_USER_ACCESS SECTRACK 1016236 BID 18295 BUGTRAQ 20060606 Asterisk 1.2.9 and Asterisk 1.0.11 Released - Security Fix BUGTRAQ 20060609 CORE-2006-0330: Asterisk PBX truncated video frame vulnerability SECUNIA 20497 SECUNIA 20658 SECUNIA 20899 SECUNIA 21222 VUPEN ADV-2006-2181 DEBIAN DSA-1126 GENTOO GLSA-200606-15 SUSE SUSE-SR:2006:015 XF asterisk-iax2-videoframe-bo(27045) CONFIRM http://www.asterisk.org/node/95 The IAX2 channel driver (chan_iax2) for Asterisk 1.2.x before 1.2.9 and 1.0.x before 1.0.11 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via truncated IAX 2 (IAX2) video frames, which bypasses a length check and leads to a buffer overflow involving negative length check. NOTE: the vendor advisory claims that only a DoS is possible, but the original researcher is reliable.