Asterisk.chan_skinny.Remote.Unauthenticated.Heap.Overflow

description-logoDescription

This indicates an attack attempt against a Buffer Overflow vulnerability in
Asterisk.
The vulnerability is caused by an error when the vulnerable software handles
a malicious string. It allows a remote attacker to execute arbitrary code via sending a malicious request.

affected-products-logoAffected Products

Asterisk Asterisk 1.2.11 and earlier versions.

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586
http://security.debian.org/pool/updates/main/a/asterisk

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)