CVE-2012-3553

Severity

40%

Complexity

80%

Confidentiality

48%

Per: http://cwe.mitre.org/data/definitions/476.html 'CWE-476: NULL Pointer Dereference'

chan_skinny.c in the Skinny (aka SCCP) channel driver in Asterisk Open Source 10.x before 10.5.1 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by sending a Station Key Pad Button message and closing a connection in off-hook mode, a related issue to CVE-2012-2948.

Per: http://cwe.mitre.org/data/definitions/476.html 'CWE-476: NULL Pointer Dereference'

CVSS 2.0 Base Score 4. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P).

Overview

Type

Digium Asterisk

First reported 12 years ago

2012-06-19 20:55:00

Last updated 12 years ago

2012-06-26 04:00:00

Affected Software

Digium Asterisk 10.0.0

10.0.0

Digium Asterisk 10.0.0 beta1

10.0.0

Digium Asterisk 10.0.0 beta2

10.0.0

Digium Asterisk 10.0.0 release candidate 1

10.0.0

Digium Asterisk 10.0.0 release candidate 2

10.0.0

Digium Asterisk 10.0.0 release candidate 3

10.0.0

Digium Asterisk 10.0.1

10.0.1

Digium Asterisk 10.1.0

10.1.0

Digium Asterisk 10.1.0 release candidate 1

10.1.0

Digium Asterisk 10.1.0 release candidate 2

10.1.0

Digium Asterisk 10.1.1

10.1.1

Digium Asterisk 10.1.2

10.1.2

Digium Asterisk 10.1.3

10.1.3

Digium Asterisk 10.2.0

10.2.0

Digium Asterisk 10.2.0 release candidate 1

10.2.0

Digium Asterisk 10.2.0 release candidate 2

10.2.0

Digium Asterisk 10.2.0 release candidate 3

10.2.0

Digium Asterisk 10.2.0 release candidate 4

10.2.0

Digium Asterisk 10.2.1

10.2.1

Digium Asterisk 10.3.0

10.3.0

Digium Asterisk 10.3.0 release candidate 2

10.3.0

Digium Asterisk 10.3.0 release candidate 3

10.3.0

Digium Asterisk 10.3.1

10.3.1

Digium Asterisk 10.4.0

10.4.0

Digium Asterisk 10.4.0 release candidate 1

10.4.0

Digium Asterisk 10.4.0 release candidate 2

10.4.0

Digium Asterisk 10.4.0 release candidate 3

10.4.0

Digium Asterisk 10.4.1

10.4.1

Digium Asterisk 10.4.2

10.4.2

Digium Asterisk 10.5.0

10.5.0

Digium Asterisk 10.5.0 release candidate 1

10.5.0

Digium Asterisk 10.5.0 release candidate 2

10.5.0

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.