Asterisk 1.2.10 supports the use of client-controlled variables to determine filenames in the Record function, which allows remote attackers to (1) execute code via format string specifiers or (2) overwrite files via directory traversals involving unspecified vectors, as demonstrated by the CALLERIDNAME variable.
https://exchange.xforce.ibmcloud.com/vulnerabilities/28564
https://exchange.xforce.ibmcloud.com/vulnerabilities/28544
http://www.vupen.com/english/advisories/2006/3372
http://www.sineapps.com/news.php?rssid=1448
http://www.securityfocus.com/bid/19683
http://www.securityfocus.com/archive/1/444322/100/0/threaded
http://www.gentoo.org/security/en/glsa/glsa-200610-15.xml
http://securitytracker.com/id?1016742