Integer overflow in the get_input function in the Skinny channel driver (chan_skinny.c) in Asterisk 1.0.x prior to 1.0.12 and 1.2.x prior to 1.2.13, as used by Cisco SCCP phones, allows remote malicious users to execute arbitrary code via a certain dlen value that passes a signed integer comparison and leads to a heap-based buffer overflow.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
digium asterisk 0.4 |
||
digium asterisk 0.7 |
||
digium asterisk 1.0.8 |
||
digium asterisk 1.0.9 |
||
digium asterisk 1.2.9 |
||
digium asterisk 1.2_beta1 |
||
digium asterisk 0.2 |
||
digium asterisk 0.3 |
||
digium asterisk 1.0.11 |
||
digium asterisk 1.0.7 |
||
digium asterisk 1.2.7 |
||
digium asterisk 1.2.8 |
||
digium asterisk 0.1.7 |
||
digium asterisk 0.1.8 |
||
digium asterisk 0.7.1 |
||
digium asterisk 0.7.2 |
||
digium asterisk 1.2.10 |
||
digium asterisk 1.2.11 |
||
digium asterisk 1.2_beta2 |
||
digium asterisk 0.1.9 |
||
digium asterisk 0.1.9.1 |
||
digium asterisk 0.9 |
||
digium asterisk 1.0 |
||
digium asterisk 1.0.10 |
||
digium asterisk 1.2.12 |
||
digium asterisk 1.2.6 |