Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-2948

Опубликовано: 02 июн. 2012
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4

Описание

chan_skinny.c in the Skinny (aka SCCP) channel driver in Certified Asterisk 1.8.11-cert before 1.8.11-cert2 and Asterisk Open Source 1.8.x before 1.8.12.1 and 10.x before 10.4.1 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by closing a connection in off-hook mode. A remote attacker with a valid SCCP ID can can use this vulnerability by closing a connection to the Asterisk server in certain call states (e.g. "Off hook") to crash the server. Successful exploitation of this vulnerability would result in termination of the server, causing denial of service to legitimate users.

РелизСтатусПримечание
devel

not-affected

1:1.8.13.1~dfsg-1ubuntu1
esm-apps/xenial

not-affected

1:1.8.13.1~dfsg-1ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [1:1.8.13.1~dfsg-1ubuntu1]]
hardy

ignored

end of life
lucid

ignored

end of life
natty

ignored

end of life
oneiric

ignored

end of life
precise

ignored

end of life
precise/esm

DNE

precise was needed
quantal

not-affected

1:1.8.13.1~dfsg-1ubuntu1

Показывать по

EPSS

Процентиль: 88%
0.03932
Низкий

4 Medium

CVSS2

Связанные уязвимости

nvd
больше 13 лет назад

chan_skinny.c in the Skinny (aka SCCP) channel driver in Certified Asterisk 1.8.11-cert before 1.8.11-cert2 and Asterisk Open Source 1.8.x before 1.8.12.1 and 10.x before 10.4.1 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by closing a connection in off-hook mode.

debian
больше 13 лет назад

chan_skinny.c in the Skinny (aka SCCP) channel driver in Certified Ast ...

github
больше 3 лет назад

chan_skinny.c in the Skinny (aka SCCP) channel driver in Certified Asterisk 1.8.11-cert before 1.8.11-cert2 and Asterisk Open Source 1.8.x before 1.8.12.1 and 10.x before 10.4.1 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by closing a connection in off-hook mode.

EPSS

Процентиль: 88%
0.03932
Низкий

4 Medium

CVSS2