{"id":"CVE-2011-2535","details":"chan_iax2.c in the IAX2 channel driver in Asterisk Open Source 1.4.x before 1.4.41.1, 1.6.2.x before 1.6.2.18.1, and 1.8.x before 1.8.4.3, and Asterisk Business Edition C.3 before C.3.7.3, accesses a memory address contained in an option control frame, which allows remote attackers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a crafted frame.","modified":"2026-01-27T04:10:50.945982Z","published":"2011-07-06T19:55:03Z","withdrawn":"2026-01-27T04:10:50.945982Z","references":[{"type":"ADVISORY","url":"http://downloads.asterisk.org/pub/security/AST-2011-010.html"},{"type":"ADVISORY","url":"http://secunia.com/advisories/44973"},{"type":"ADVISORY","url":"http://secunia.com/advisories/45048"},{"type":"ADVISORY","url":"http://secunia.com/advisories/45201"},{"type":"ADVISORY","url":"http://secunia.com/advisories/45239"},{"type":"ADVISORY","url":"http://www.debian.org/security/2011/dsa-2276"},{"type":"FIX","url":"http://downloads.asterisk.org/pub/security/AST-2011-010-1.8.diff"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062628.html"},{"type":"WEB","url":"http://securitytracker.com/id?1025708"},{"type":"WEB","url":"http://www.osvdb.org/73309"},{"type":"WEB","url":"http://www.securityfocus.com/bid/48431"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/68205"}],"schema_version":"1.7.3"}