CVE-2006-2923
CVSS V2 Medium 6.4
CVSS V3 None
Description
The iax_net_read function in the iaxclient open source library, as used in multiple products including (a) LoudHush 1.3.6, (b) IDE FISK 1.35 and earlier, (c) Kiax 0.8.5 and earlier, (d) DIAX, (e) Ziaxphone, (f) IAX Phone, (g) X-lite, (h) MediaX, (i) Extreme Networks ePhone, and (j) iaxComm before 1.2.0, allows remote attackers to execute arbitrary code via crafted IAX 2 (IAX2) packets with truncated (1) full frames or (2) mini-frames, which are detected in a length check but still processed, leading to buffer overflows related to negative length values.
Overview
- CVE ID
- CVE-2006-2923
- Assigner
- cve@mitre.org
- Vulnerability Status
- Modified
- Published Version
- 2006-06-09T10:02:00
- Last Modified Date
- 2018-10-18T16:43:43
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:loudhush:loudhush:1.3.6:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:L/Au:N/C:P/I:P/A:N
- Access Vector
- NETWORK
- Access Compatibility
- LOW
- Authentication
- NONE
- Confidentiality Impact
- PARTIAL
- Integrity Impact
- PARTIAL
- Availability Impact
- NONE
- Base Score
- 6.4
- Severity
- MEDIUM
- Exploitability Score
- 10
- Impact Score
- 4.9
References
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2006-2923 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2923 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 18:07:23 | Added to TrackCVE |