CVE-2006-5444
🟡 Monitoruj
Przepełnienie bufora w Asterisk umożliwia zdalne wykonanie kodu przez atakujących.
CVSS
7.5
EPSS
87.1%
Exploit
poc
Vendor
digium
Opis źródłowy (NVD)
Integer overflow in the get_input function in the Skinny channel driver (chan_skinny.c) in Asterisk 1.0.x before 1.0.12 and 1.2.x before 1.2.13, as used by Cisco SCCP phones, allows remote attackers to execute arbitrary code via a certain dlen value that passes a signed integer comparison and leads to a heap-based buffer overflow.
buffer-overflow exploit
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.5 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 87.1% |
| Opublikowano (NVD) | 2006-10-23 17:07:00 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-23 00:35:47 UTC |
Referencje
- http://ftp.digium.com/pub/asterisk/releases/ChangeLog-1.0.12 (cve@mitre.org) [Patch]
- http://ftp.digium.com/pub/asterisk/releases/ChangeLog-1.2.13 (cve@mitre.org) [Patch]
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050171.html (cve@mitre.org)
- http://secunia.com/advisories/22480 (cve@mitre.org) [Patch, Vendor Advisory]
- http://secunia.com/advisories/22651 (cve@mitre.org)
- http://secunia.com/advisories/22979 (cve@mitre.org)
- http://secunia.com/advisories/23212 (cve@mitre.org)
- http://securitytracker.com/id?1017089 (cve@mitre.org) [Patch]
- http://www.asterisk.org/node/109 (cve@mitre.org) [Patch]
- http://www.gentoo.org/security/en/glsa/glsa-200610-15.xml (cve@mitre.org)
- http://www.kb.cert.org/vuls/id/521252 (cve@mitre.org) [US Government Resource]
- http://www.novell.com/linux/security/advisories/2006_69_asterisk.html (cve@mitre.org)
- http://www.osvdb.org/29972 (cve@mitre.org)
- http://www.securityfocus.com/archive/1/449127/100/0/threaded (cve@mitre.org)
- http://www.securityfocus.com/archive/1/449183/100/0/threaded (cve@mitre.org)
- http://www.securityfocus.com/bid/20617 (cve@mitre.org) [Exploit, Patch]
- http://www.us.debian.org/security/2006/dsa-1229 (cve@mitre.org)
- http://www.vupen.com/english/advisories/2006/4097 (cve@mitre.org)
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29663 (cve@mitre.org)