VOIP: Asterisk Chan_Skinny Buffer Overflow
This signature detects attempts to exploit a known vulnerability in the Asterisk Chan_Skinny driver for Cisco SCCP Voip phones. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the daemon.
Extended Description
Asterisk is prone to a remote heap-based buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. Exploiting this vulnerability allows remote attackers to execute arbitrary machine code in the context of the affected application. Failed exploit attempts will likely crash the server, denying further service to legitimate users.
Affected Products
Openpkg openpkg
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Suse
Asterisk
Debian
Gentoo
Openpkg
7.5