Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2006:069: asterisk

Vulnerability Assessment Details

SUSE-SA:2006:069: asterisk

Vulnerability Assessment Summary
Check for the version of the asterisk package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory SUSE-SA:2006:069 (asterisk).

Two security problem have been found and fixed in the PBX software

CVE-2006-5444: Integer overflow in the get_input function in the
Skinny channel driver (chan_skinny.c) as used by Cisco SCCP phones,
permits remote attackers to potentially execute arbitrary code via a
certain dlen value that passes a signed integer comparison and leads
to a heap-based buffer overflow.

CVE-2006-5445: A vulnerability in the SIP channel driver
(channels/chan_sip.c) in Asterisk on SUSE Linux 10.1 permits remote
attackers to cause a denial of service (resource consumption)
via unspecified vectors that result in the creation of 'a real pvt
structure' that uses more resources than necessary.

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security

Cables, Connectors

Lenovo ThinkServer RAID 520i PCIe Adapter
Lenovo ThinkServer RAID 520i PCIe Adapter pictureAbit BX133-RAID s370 motherboard
Abit BX133-RAID s370 motherboard  pictureLaCie 2big 6TB 2-Bay Thunderbolt 2 RAID Array
LaCie 2big 6TB 2-Bay Thunderbolt 2 RAID Array pictureLenovo ThinkSystem RAID 930-16i 4GB Flash PCIe 12Gb Adapter
Lenovo ThinkSystem RAID 930-16i 4GB Flash PCIe 12Gb Adapter picture


No Discussions have been posted on this vulnerability.