ID CVE-2012-3553
Summary chan_skinny.c in the Skinny (aka SCCP) channel driver in Asterisk Open Source 10.x before 10.5.1 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by sending a Station Key Pad Button message and closing a connection in off-hook mode, a related issue to CVE-2012-2948. Per: http://cwe.mitre.org/data/definitions/476.html 'CWE-476: NULL Pointer Dereference'
References
Vulnerable Configurations
  • cpe:2.3:a:digium:asterisk:10.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:10.0.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.0.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:10.0.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.0.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:10.0.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.0.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:10.0.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.0.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:10.0.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.0.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:10.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:10.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:10.1.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.1.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:10.1.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.1.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:10.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:10.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:10.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:10.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:10.2.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.2.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:10.2.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.2.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:10.2.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.2.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:10.2.0:rc4:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.2.0:rc4:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:10.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:10.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:10.3.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.3.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:10.3.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.3.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:10.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:10.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:10.4.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.4.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:10.4.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.4.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:10.4.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.4.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:10.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:10.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:10.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:10.5.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.5.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:10.5.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:10.5.0:rc2:*:*:*:*:*:*
CVSS
Base: 4.0 (as of 26-06-2012 - 04:00)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:S/C:N/I:N/A:P
refmap via4
confirm http://downloads.asterisk.org/pub/security/AST-2012-009.html
Last major update 26-06-2012 - 04:00
Published 19-06-2012 - 20:55
Last modified 26-06-2012 - 04:00
Back to Top