Asterisk Remote Crash Vulnerability in Skinny Channel Driver (AST-2012-008)
Low Nessus Plugin ID 59504
SynopsisA telephony application running on the remote host is affected by a denial of service vulnerability.
DescriptionAccording to the version in its SIP banner, the version of Asterisk running on the remote host is potentially affected by a vulnerability that could allow a remote attacker to crash the server. This issue could be exploited when the attacker has a valid SCCP (Skinny) ID and closes a connection when in certain call states. A NULL pointer is left behind and can cause the server to crash when the pointer is later dereferenced.
SolutionUpgrade to Asterisk 220.127.116.11 / 10.4.1 / 1.8.11-cert-2 or apply the patches listed in the Asterisk advisory.