asterisk

Page content
  • Author: voroskoi
  • Vulnerable: asterisk-1.2.11-1
  • Unaffected: asterisk-1.2.13-1siwenna1

Adam Boileau has reported a vulnerability in Asterisk, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. The vulnerability is caused due to an integer overflow within the “get_input()” function in chan_skinny.c. This can be exploited to cause a heap-based buffer overflow by sending specially crafted packets to the Asterisk Skinny channel driver. Successful exploitation may allow the execution of arbitrary code, but requires that “chan_skinny” is loaded.

CVEs: