Overview
Asterisk contains an integer overflow vulnerability. This vulnerability may allow an attacker to run arbitrary code.
Description
Asterisk is an open-source PBX software package that provides voicemail, three-way calling, and other features. Skinny Client Control Protocol (SCCP) is a proprietary Cisco protocol that is used to connect Cisco Call Managers and Cisco Voice over IP (VOIP) phones. Asterisk provides a driver for phones that use the SCCP protocol called chan_skinny. An integer overflow vulnerability exists in the get_input(struct skinnysession *s) function which is found in the chan_skinny driver. Exploitation of this vulnerability may allow an attacker to execute arbitrary code. |
Impact
A remote, unauthenticated attacker may be able to execute arbitrary code with root privileges. |
Solution
Update |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050171.html
- http://secunia.com/advisories/22480/
- http://www.asterisk.org/node/109
- http://www.cisco.com/en/US/tech/tk652/tk701/tk589/tsd_technology_support_sub-protocol_home.html
- http://www.asterisk.org/node/108
- http://secunia.com/advisories/22651/
- http://secunia.com/advisories/22979/
- http://secunia.com/advisories/23212/
- http://www.securityfocus.com/bid/20617
Acknowledgements
This vulnerability report was based on information from Adam Boileau of Security-Assessment.com.
This document was written by Ryan Giobbi.
Other Information
CVE IDs: | CVE-2006-5444 |
Severity Metric: | 3.82 |
Date Public: | 2006-10-18 |
Date First Published: | 2006-10-24 |
Date Last Updated: | 2007-01-19 17:44 UTC |
Document Revision: | 40 |