Asterisk Skinny Channel Driver (chan_skinny) get_input Function Remote Overflow

high Nessus Plugin ID 22878

Synopsis

A telephony application running on the remote host is affected by a heap overflow vulnerability.

Description

The chan_skinny channel driver included in the version of Asterisk running on the remote host does not properly validate the length header in incoming packets. An unauthenticated, remote attacker may be able to leverage this flaw to execute code on the affected host subject to the privileges under which Asterisk runs, generally root.

Solution

Either disable the chan_skinny channel driver or upgrade to Asterisk 1.2.13 or later.

See Also

https://www.securityfocus.com/archive/1/449127/30/0/threaded

http://www.nessus.org/u?e5f58960

Plugin Details

Severity: High

ID: 22878

File Name: asterisk_chan_skinny_dlen_overflow.nasl

Version: 1.24

Type: remote

Published: 10/19/2006

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.3

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:digium:asterisk

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/19/2006

Vulnerability Publication Date: 10/18/2006

Reference Information

CVE: CVE-2006-5444

BID: 20617