Heap-based buffer overflow in chan_skinny.c in the Skinny channel driver in Asterisk Open Source 1.6.2.x before 1.6.2.24, 1.8.x before 1.8.11.1, and 10.x before 10.3.1 allows remote authenticated users to cause a denial of service or possibly have unspecified other impact via a series of KEYPAD_BUTTON_MESSAGE events.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 01:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://downloads.asterisk.org/pub/security/AST-2012-005.html - Patch, Vendor Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079759.html - | |
References | () http://osvdb.org/81455 - | |
References | () http://secunia.com/advisories/48891 - | |
References | () http://secunia.com/advisories/48941 - | |
References | () http://www.debian.org/security/2012/dsa-2460 - | |
References | () http://www.securityfocus.com/bid/53210 - | |
References | () http://www.securitytracker.com/id?1026962 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/75102 - |
Information
Published : 2012-04-30 20:55
Updated : 2024-11-21 01:39
NVD link : CVE-2012-2415
Mitre link : CVE-2012-2415
CVE.ORG link : CVE-2012-2415
JSON object : View
Products Affected
asterisk
- open_source
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer