Release date: 2012-04-23
Updated on: 2012-04-24
Affected Systems:
Asterisk 10.x
Asterisk 1.x
Unaffected system:
Asterisk 10.3.1
Asterisk 1.8.11.1
Asterisk 1.6.2.24
Description:
--------------------------------------------------------------------------------
Bugtraq id: 53210
CVE (CAN) ID: CVE-2012-2415
Asterisk is a free and open-source software that enables the Telephone User Switch (PBX) function.
Asterisk has a security vulnerability in the implementation of the Skinny channel driver. Because the buffer length is not checked, attackers can send a large number of KEYPAD_BUTTON_MESSAGE events, resulting in buffer overflow.
<* Source: Russell Bryant (russell@digium.com)
Link: http://downloads.asterisk.org/pub/security/AST-2012-005.html
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Asterisk
--------
Asterisk has released a Security Bulletin (AST-2012-005) and corresponding patches for this:
AST-2012-005: Heap Buffer Overflow in Skinny Channel Driver
Link: http://downloads.asterisk.org/pub/security/AST-2012-005.html