Asterisk.chan_skinny.Remote.Unauthenticated.Heap.Overflow
Description
This indicates an attack attempt against a Buffer Overflow vulnerability in
Asterisk.
The vulnerability is caused by an error when the vulnerable software handles
a malicious string. It allows a remote attacker to execute arbitrary code via sending a malicious request.
Affected Products
Asterisk Asterisk 1.2.11 and earlier versions.
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586
http://security.debian.org/pool/updates/main/a/asterisk
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |