Vulnerability Description
Integer overflow in the get_input function in the Skinny channel driver (chan_skinny.c) in Asterisk 1.0.x before 1.0.12 and 1.2.x before 1.2.13, as used by Cisco SCCP phones, allows remote attackers to execute arbitrary code via a certain dlen value that passes a signed integer comparison and leads to a heap-based buffer overflow.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Digium | Asterisk | 0.1.7 |
References
- http://ftp.digium.com/pub/asterisk/releases/ChangeLog-1.0.12Patch
- http://ftp.digium.com/pub/asterisk/releases/ChangeLog-1.2.13Patch
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050171.html
- http://secunia.com/advisories/22480PatchVendor Advisory
- http://secunia.com/advisories/22651
- http://secunia.com/advisories/22979
- http://secunia.com/advisories/23212
- http://securitytracker.com/id?1017089Patch
- http://www.asterisk.org/node/109Patch
- http://www.gentoo.org/security/en/glsa/glsa-200610-15.xml
- http://www.kb.cert.org/vuls/id/521252US Government Resource
- http://www.novell.com/linux/security/advisories/2006_69_asterisk.html
- http://www.osvdb.org/29972
- http://www.securityfocus.com/archive/1/449127/100/0/threaded
- http://www.securityfocus.com/archive/1/449183/100/0/threaded
FAQ
What is CVE-2006-5444?
CVE-2006-5444 is a vulnerability with a CVSS score of 7.5 (HIGH). Integer overflow in the get_input function in the Skinny channel driver (chan_skinny.c) in Asterisk 1.0.x before 1.0.12 and 1.2.x before 1.2.13, as used by Cisco SCCP phones, allows remote attackers t...
How severe is CVE-2006-5444?
CVE-2006-5444 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-5444?
Check the references section above for vendor advisories and patch information. Affected products include: Digium Asterisk.