Asterisk Skinny Channel Driver (chan_skinny) get_input Function Remote Overflow

This script is Copyright (C) 2006-2016 Tenable Network Security, Inc.


Synopsis :

A telephony application running on the remote host is affected by a
heap overflow vulnerability.

Description :

The chan_skinny channel driver included in the version of Asterisk
running on the remote host does not properly validate the length
header in incoming packets. An unauthenticated, remote attacker may be
able to leverage this flaw to execute code on the affected host
subject to the privileges under which Asterisk runs, generally root.

See also :

http://www.securityfocus.com/archive/1/449127/30/0/threaded
http://www.nessus.org/u?e5f58960

Solution :

Either disable the chan_skinny channel driver or upgrade to Asterisk
1.2.13 or later.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 7.1
(CVSS2#E:F/RL:ND/RC:ND)
Public Exploit Available : true

Family: Gain a shell remotely

Nessus Plugin ID: 22878 (asterisk_chan_skinny_dlen_overflow.nasl)

Bugtraq ID: 20617

CVE ID: CVE-2006-5444

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now