Vulnerability Note VU#521252
Integer overflow vulnerability in Asterisk driver for Cisco SCCP-enabled phones
Asterisk contains an integer overflow vulnerability. This vulnerability may allow an attacker to run arbitrary code.
Asterisk is an open-source PBX software package that provides voicemail, three-way calling, and other features. Skinny Client Control Protocol (SCCP) is a proprietary Cisco protocol that is used to connect Cisco Call Managers and Cisco Voice over IP (VOIP) phones. Asterisk provides a driver for phones that use the SCCP protocol called chan_skinny.
An integer overflow vulnerability exists in the get_input(struct skinnysession *s) function which is found in the chan_skinny driver. Exploitation of this vulnerability may allow an attacker to execute arbitrary code.
A remote, unauthenticated attacker may be able to execute arbitrary code with root privileges.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Asterisk||Affected||-||24 Oct 2006|
CVSS Metrics (Learn More)
This vulnerability report was based on information from Adam Boileau of Security-Assessment.com.
This document was written by Ryan Giobbi.
- CVE IDs: CVE-2006-5444
- Date Public: 18 Oct 2006
- Date First Published: 24 Oct 2006
- Date Last Updated: 19 Jan 2007
- Severity Metric: 3.82
- Document Revision: 40
If you have feedback, comments, or additional information about this vulnerability, please send us email.