Release date:
Updated on:
Affected Systems:
Asterisk 1.x
Asterisk Certified Asterisk 1.8.11-cert1
Unaffected system:
Asterisk 10.4.1
Asterisk 1.8.12.1
Asterisk Certified Asterisk 1.8.11-cert2
Description:
--------------------------------------------------------------------------------
Bugtraq id: 53723
Cve id: CVE-2012-2948
Asterisk is a free and open-source software that enables the Telephone User Switch (PBX) function.
Asterisk has a security vulnerability in the implementation of the Skinny channel driver. When the SCCP client closes its server connection, the pointer in the structure will be set to null. If the client is not in the hanging status at this time, the pointer will be discarded. Attackers with sccp ids can disable Asterisk server connections in certain call states. This vulnerability can trigger NULL pointer reference and cause system crash.
<* Source: Thomas Biege (thomas@suse.de)
Link: http://downloads.asterisk.org/pub/security/AST-2012-008.pdf
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Asterisk
--------
Asterisk has released a Security Bulletin (AST-2012-008) and corresponding patches for this:
AST-2012-008: Skinny Channel Driver Remote Crash Vulnerability
Link: http://downloads.asterisk.org/pub/security/AST-2012-008.pdf