Asterisk Remote Crash Vulnerability in Skinny Channel Driver (AST-2012-008)
Medium Nessus Plugin ID 59504
SynopsisA telephony application running on the remote host is affected by a denial of service vulnerability.
DescriptionAccording to the version in its SIP banner, the version of Asterisk running on the remote host is potentially affected by a vulnerability that could allow a remote attacker to crash the server. This issue could be exploited when the attacker has a valid SCCP (Skinny) ID and closes a connection when in certain call states. A NULL pointer is left behind and can cause the server to crash when the pointer is later dereferenced.
SolutionUpgrade to Asterisk 184.108.40.206 / 10.4.1 / 1.8.11-cert-2 or apply the patches listed in the Asterisk advisory.