ID CVE-2006-5444
Summary Integer overflow in the get_input function in the Skinny channel driver (chan_skinny.c) in Asterisk 1.0.x before 1.0.12 and 1.2.x before 1.2.13, as used by Cisco SCCP phones, allows remote attackers to execute arbitrary code via a certain dlen value that passes a signed integer comparison and leads to a heap-based buffer overflow. Failed exploit attempts will likely crash the server, denying further service to legitimate users. This vulnerability is addressed in the following product releases: Asterisk, Asterisk, 1.0.12 or later Asterisk, Asterisk, 1.2.13 or later
References
Vulnerable Configurations
  • cpe:2.3:a:digium:asterisk:0.1.7:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.1.7:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.1.8:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.1.8:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.1.9:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.1.9:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.1.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.1.9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.2:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.3:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.4:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.7:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:0.9:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.2.10:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.2.11:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.2.11:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.2.12:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.2.12:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.2_beta1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.2_beta1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:1.2_beta2:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:1.2_beta2:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 17-10-2018 - 21:42)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 20617
bugtraq 20061018 Security-Assessment.com Advisory: Asterisk remote heap overflow
cert-vn VU#521252
confirm
debian DSA-1229
fulldisc 20061018 Asterisk remote heap overflow
gentoo GLSA-200610-15
openpkg OpenPKG-SA-2006.024
osvdb 29972
sectrack 1017089
secunia
  • 22480
  • 22651
  • 22979
  • 23212
suse SUSE-SA:2006:069
vupen ADV-2006-4097
xf asterisk-getinput-code-execution(29663)
Last major update 17-10-2018 - 21:42
Published 23-10-2006 - 17:07
Last modified 17-10-2018 - 21:42
Back to Top