DEBIAN-CVE-2006-2898

Source
https://security-tracker.debian.org/tracker/CVE-2006-2898
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2006-2898.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2006-2898
Upstream
Published
2006-06-07T10:02:00Z
Modified
2025-11-02T17:01:27Z
Summary
[none]
Details

The IAX2 channel driver (chan_iax2) for Asterisk 1.2.x before 1.2.9 and 1.0.x before 1.0.11 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via truncated IAX 2 (IAX2) video frames, which bypasses a length check and leads to a buffer overflow involving negative length check. NOTE: the vendor advisory claims that only a DoS is possible, but the original researcher is reliable.

References

Affected packages

Debian:11 / asterisk

Package

Name
asterisk
Purl
pkg:deb/debian/asterisk?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:1.2.10.dfsg-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:11 / iaxmodem

Package

Name
iaxmodem
Purl
pkg:deb/debian/iaxmodem?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.1.8.dfsg-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / iaxmodem

Package

Name
iaxmodem
Purl
pkg:deb/debian/iaxmodem?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.1.8.dfsg-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / iaxmodem

Package

Name
iaxmodem
Purl
pkg:deb/debian/iaxmodem?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.1.8.dfsg-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}