ID CVE-2006-5445
Summary Unspecified vulnerability in the SIP channel driver (channels/chan_sip.c) in Asterisk 1.2.x before 1.2.13 and 1.4.x before 1.4.0-beta3 allows remote attackers to cause a denial of service (resource consumption) via unspecified vectors that result in the creation of "a real pvt structure" that uses more resources than necessary.
References
Vulnerable Configurations
  • cpe:2.3:a:digium:asterisk:1.2.0_beta1
    cpe:2.3:a:digium:asterisk:1.2.0_beta1
  • cpe:2.3:a:digium:asterisk:1.2.0_beta2
    cpe:2.3:a:digium:asterisk:1.2.0_beta2
  • Digium Asterisk 1.2.6
    cpe:2.3:a:digium:asterisk:1.2.6
  • Digium Asterisk 1.2.7
    cpe:2.3:a:digium:asterisk:1.2.7
  • Digium Asterisk 1.2.8
    cpe:2.3:a:digium:asterisk:1.2.8
  • Digium Asterisk 1.2.9
    cpe:2.3:a:digium:asterisk:1.2.9
  • Digium Asterisk 1.2.10
    cpe:2.3:a:digium:asterisk:1.2.10
  • Digium Asterisk 1.2.11
    cpe:2.3:a:digium:asterisk:1.2.11
  • Digium Asterisk 1.2.12
    cpe:2.3:a:digium:asterisk:1.2.12
  • Digium Asterisk 1.2.12.1
    cpe:2.3:a:digium:asterisk:1.2.12.1
  • Digium Asterisk 1.4.0
    cpe:2.3:a:digium:asterisk:1.4.0
  • cpe:2.3:a:digium:asterisk:1.4.0_beta1
    cpe:2.3:a:digium:asterisk:1.4.0_beta1
  • cpe:2.3:a:digium:asterisk:1.4.0_beta2
    cpe:2.3:a:digium:asterisk:1.4.0_beta2
CVSS
Base: 7.8 (as of 23-10-2006 - 16:27)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
nessus via4
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-200610-15.NASL
    description The remote host is affected by the vulnerability described in GLSA-200610-15 (Asterisk: Multiple vulnerabilities) Asterisk contains buffer overflows in channels/chan_mgcp.c from the MGCP driver and in channels/chan_skinny.c from the Skinny channel driver for Cisco SCCP phones. It also dangerously handles client-controlled variables to determine filenames in the Record() function. Finally, the SIP channel driver in channels/chan_sip.c could use more resources than necessary under unspecified circumstances. Impact : A remote attacker could execute arbitrary code by sending a crafted audit endpoint (AUEP) response, by sending an overly large Skinny packet even before authentication, or by making use of format strings specifiers through the client-controlled variables. An attacker could also cause a Denial of Service by resource consumption through the SIP channel driver. Workaround : There is no known workaround for the format strings vulnerability at this time. You can comment the lines in /etc/asterisk/mgcp.conf, /etc/asterisk/skinny.conf and /etc/asterisk/sip.conf to deactivate the three vulnerable channel drivers. Please note that the MGCP channel driver is disabled by default.
    last seen 2019-02-21
    modified 2018-07-11
    plugin id 22930
    published 2006-10-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=22930
    title GLSA-200610-15 : Asterisk: Multiple vulnerabilities
  • NASL family SuSE Local Security Checks
    NASL id SUSE_ASTERISK-2272.NASL
    description This update fixes 2 security problem in the PBX software Asterisk. CVE-2006-5444: Integer overflow in the get_input function in the Skinny channel driver (chan_skinny.c) as used by Cisco SCCP phones, allows remote attackers to execute arbitrary code via a certain dlen value that passes a signed integer comparison and leads to a heap-based buffer overflow. CVE-2006-5445: A vulnerability in the SIP channel driver (channels/chan_sip.c) in Asterisk on SUSE Linux 10.1 allows remote attackers to cause a denial of service (resource consumption) via unspecified vectors that result in the creation of 'a real pvt structure' that uses more resources than necessary.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 27156
    published 2007-10-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=27156
    title openSUSE 10 Security Update : asterisk (asterisk-2272)
refmap via4
bid 20835
confirm
gentoo GLSA-200610-15
openpkg OpenPKG-SA-2006.024
osvdb 29973
secunia
  • 22651
  • 22979
suse SUSE-SA:2006:069
vupen ADV-2006-4098
xf asterisk-channeldriver-dos(29664)
Last major update 07-03-2011 - 21:43
Published 23-10-2006 - 13:07
Last modified 17-10-2018 - 17:42
Back to Top