Vulnerable Systems:
* Asterisk Open Source 1.8.18.0 and prior
* Asterisk Digiumphones 10.10.0-digiumphones and prior
* Certified Asterisk 1.8.11-cert9
Asterisk contains a flaw in the HTTP Asterisk Management Interface (AMI). The issue is triggered as 'ast_http_get_post_vars()' [main/http.c] passes a size value to 'alloca()' based on the 'Content-Length' value in HTTP POST input without any validation. With specially crafted requests, a remote attacker can corrupt stack memory, resulting in execution of arbitrary code.