VYPR
Unrated severityNVD Advisory· Published Sep 18, 2012· Updated Apr 29, 2026

CVE-2012-1184

CVE-2012-1184

Description

Stack-based buffer overflow in the ast_parse_digest function in main/utils.c in Asterisk 1.8.x before 1.8.10.1 and 10.x before 10.2.1 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string in an HTTP Digest Authentication header.

Affected products

81
  • Digium/Asterisk81 versions
    cpe:2.3:a:digium:asterisk:10.0.0:*:*:*:*:*:*:*+ 80 more
    • cpe:2.3:a:digium:asterisk:10.0.0:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:10.0.0:beta1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:10.0.0:beta2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:10.0.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:10.0.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:10.0.0:rc3:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:10.0.1:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:10.1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:10.1.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:10.1.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:10.1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:10.1.2:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:10.1.3:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:10.2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:10.2.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:10.2.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:10.2.0:rc3:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:10.2.0:rc4:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.10.0:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.10.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.10.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.10.0:rc3:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.10.0:rc4:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.8.0:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.8.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.8.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.8.0:rc3:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.8.0:rc4:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.8.0:rc5:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.8.1:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.8.2:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.9.0:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.9.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.9.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.9.0:rc3:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.9.1:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.9.2:*:*:*:*:*:*:*
    • cpe:2.3:a:digium:asterisk:1.8.9.3:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

9

News mentions

0

No linked articles in our index yet.