VOIP: Asterisk Chan_Skinny Buffer Overflow

This signature detects attempts to exploit a known vulnerability in the Asterisk Chan_Skinny driver for Cisco SCCP Voip phones. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the daemon.

Extended Description

Asterisk is prone to a remote heap-based buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. Exploiting this vulnerability allows remote attackers to execute arbitrary machine code in the context of the affected application. Failed exploit attempts will likely crash the server, denying further service to legitimate users.

Affected Products

Openpkg openpkg

References

BugTraq: 20617 11409

CVE: CVE-2004-1595

URL: http://www.asterisk.org

Short Name
VOIP:ASTERISK-CS-OVERFLOW
Severity
Major
Recommended
False
Recommended Action
None
Category
VOIP
Keywords
Asterisk Buffer CVE-2004-1595 CVE-2006-5444 Chan_Skinny Overflow bid:11409 bid:20617
Release Date
11/02/2006
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
Port
TCP/2000
False Positive
Unknown
Vendors

Suse

Asterisk

Debian

Gentoo

Openpkg

CVSS Score

7.5

Found a potential security threat?