![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2006-1827 |
Description: | Integer signedness error in format_jpeg.c in Asterisk 1.2.6 and earlier allows remote attackers to execute arbitrary code via a length value that passes a length check as a negative number, but triggers a buffer overflow when it is used as an unsigned length. |
Test IDs: | 1.3.6.1.4.1.25623.1.0.56668 1.3.6.1.4.1.25623.1.0.56653 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2006-1827 BugTraq ID: 17561 http://www.securityfocus.com/bid/17561 Debian Security Information: DSA-1048 (Google Search) http://www.debian.org/security/2006/dsa-1048 http://www.cipher.org.uk/index.php?p=advisories/Asterisk_Codec_Integer_Overflow_07-04-2006.advisory http://secunia.com/advisories/19800 http://secunia.com/advisories/19872 http://secunia.com/advisories/19897 SuSE Security Announcement: SUSE-SR:2006:009 (Google Search) http://www.novell.com/linux/security/advisories/2006_04_28.html http://www.vupen.com/english/advisories/2006/1478 |