Vulnerability Details : CVE-2011-1147
Multiple stack-based and heap-based buffer overflows in the (1) decode_open_type and (2) udptl_rx_packet functions in main/udptl.c in Asterisk Open Source 1.4.x before 1.4.39.2, 1.6.1.x before 1.6.1.22, 1.6.2.x before 1.6.2.16.2, and 1.8 before 1.8.2.4; Business Edition C.x.x before C.3.6.3; AsteriskNOW 1.5; and s800i (Asterisk Appliance), when T.38 support is enabled, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UDPTL packet.
Vulnerability category: OverflowExecute codeDenial of service
Products affected by CVE-2011-1147
- cpe:2.3:a:digium:asterisk:1.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:c.2.3:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.22:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.23:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.23.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.10:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.15:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.16:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.19:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.19:rc4:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.20:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.20.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.22:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.22:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.23:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.23:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.25:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.25.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.26:rc5:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.26:rc6:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.0:rc5:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.10:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.7:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.12:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.17:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.18:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.20:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.21:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.21.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.22:rc5:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.22.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.22.2:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.23.2:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.24:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.26:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.26:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.3:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.0:beta4:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.13:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.14:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.19:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.19:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.19:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.20:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.20:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.21.2:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.23:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.24.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.24:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.26:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.26:rc4:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.0:rc4:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.5:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.11:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.16.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.16.2:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.19.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.19.2:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.21:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.21:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.22:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.22:rc4:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.23:rc4:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.25:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.26:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.26.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.26.2:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.10:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.7:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:c.3.0:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.27:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.10:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.10:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.27:rc5:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:c.1.8.0:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:c.1.8.1:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:c.1.6.2:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:c.1.6:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:c.1.6.1:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:c.1.0:beta7:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:c.1.0:beta8:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.11:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.12:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.12:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.2.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.2.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.2.1:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.9:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.13:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.13:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.2.0:rc4:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.2.0:rc5:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.2.3:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.16:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.2.0:rc8:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.14:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.15:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.2.0:rc6:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.2.0:rc7:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.29:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.30:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.26.3:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.28:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.29.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.29:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.30:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.27:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.27:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.35:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.33:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.33:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.39:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.39.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.28:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.31:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.33:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.33.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.27:rc4:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.36:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.36:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.27.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.34:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.34:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.31:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.31:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.37:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.37:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.30:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.27:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.34:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.35:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.32:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.32:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.39:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.38:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.38:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.2.6:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.2.16.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.2.15:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.2.16:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.2.16:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.2.6:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:c.3.3.2:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:c.3.2.2:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:c.3.1.0:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:c.3.6.2:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:c.3.2.3:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:c.3.1.1:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.20:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.19:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.18:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.18:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.19:rc3:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.21:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.20:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.19:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.20:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.17:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.18:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1.19:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisknow:1.5:*:*:*:*:*:*:*
- cpe:2.3:h:digium:s800i:*:*:*:*:*:*:*:*
Threat overview for CVE-2011-1147
Top countries where our scanners detected CVE-2011-1147
Top open port discovered on systems with this issue
80
IPs affected by CVE-2011-1147 157
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2011-1147!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2011-1147
93.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-1147
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2011-1147
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-1147
-
http://www.securitytracker.com/id?1025101
Asterisk UDPTL Array Overflows Let Remote Users Execute Arbitrary Code - SecurityTracker
-
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055421.html
[SECURITY] Fedora 14 Update: asterisk-1.6.2.17-1.fc14Patch
-
http://www.securityfocus.com/bid/46474
Asterisk UPDTL Packets Buffer Overflow Vulnerabilities
-
http://www.debian.org/security/2011/dsa-2225
Debian -- Security Information -- DSA-2225-1 asterisk
-
http://www.vupen.com/english/advisories/2011/0635
Webmail | OVH- OVHVendor Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055030.html
[SECURITY] Fedora 15 Update: asterisk-1.8.3-1.fc15Patch
-
http://www.openwall.com/lists/oss-security/2011/03/11/8
oss-security - Re: CVE Request -- Asterisk AST-2011-002 / Multiple array overflow and crash vulnerabilities in UDPTL code
-
http://www.openwall.com/lists/oss-security/2011/03/11/2
oss-security - CVE Request -- Asterisk AST-2011-002 / Multiple array overflow and crash vulnerabilities in UDPTL code
-
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055634.html
[SECURITY] Fedora 13 Update: asterisk-1.6.2.17-1.fc13Patch
-
http://downloads.asterisk.org/pub/security/AST-2011-002.html
AST-2011-002Vendor Advisory
Jump to