First published: Sat Jun 02 2012(Updated: )
chan_skinny.c in the Skinny (aka SCCP) channel driver in Certified Asterisk 1.8.11-cert before 1.8.11-cert2 and Asterisk Open Source 1.8.x before 1.8.12.1 and 10.x before 10.4.1 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by closing a connection in off-hook mode.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asterisk | =1.8.11-cert | |
Asterisk | =1.8.11-cert1 | |
Asterisk | <=1.8.12.0 | |
Asterisk | =1.8.0 | |
Asterisk | =1.8.0-beta1 | |
Asterisk | =1.8.0-beta2 | |
Asterisk | =1.8.0-beta3 | |
Asterisk | =1.8.0-beta4 | |
Asterisk | =1.8.0-beta5 | |
Asterisk | =1.8.0-rc1 | |
Asterisk | =1.8.0-rc2 | |
Asterisk | =1.8.0-rc3 | |
Asterisk | =1.8.0-rc4 | |
Asterisk | =1.8.0-rc5 | |
Asterisk | =1.8.1 | |
Asterisk | =1.8.1-rc1 | |
Asterisk | =1.8.2 | |
Asterisk | =1.8.2-rc1 | |
Asterisk | =1.8.3-rc1 | |
Asterisk | =1.8.5-rc1 | |
Asterisk | =1.8.5.0 | |
Asterisk | =1.8.6.0 | |
Asterisk | =1.8.6.0-rc1 | |
Asterisk | =1.8.6.0-rc2 | |
Asterisk | =1.8.6.0-rc3 | |
Asterisk | =1.8.7.0 | |
Asterisk | =1.8.7.0-rc1 | |
Asterisk | =1.8.7.0-rc2 | |
Asterisk | =1.8.8.0 | |
Asterisk | =1.8.8.0-rc1 | |
Asterisk | =1.8.8.0-rc2 | |
Asterisk | =1.8.8.0-rc3 | |
Asterisk | =1.8.8.0-rc4 | |
Asterisk | =1.8.8.0-rc5 | |
Asterisk | =1.8.9.0 | |
Asterisk | =1.8.9.0-rc1 | |
Asterisk | =1.8.9.0-rc2 | |
Asterisk | =1.8.9.0-rc3 | |
Asterisk | =1.8.10.0 | |
Asterisk | =1.8.10.0-rc1 | |
Asterisk | =1.8.10.0-rc2 | |
Asterisk | =1.8.10.0-rc3 | |
Asterisk | =1.8.10.0-rc4 | |
Asterisk | =1.8.11.0 | |
Asterisk | =1.8.11.0-rc2 | |
Asterisk | =1.8.11.0-rc3 | |
Asterisk | =1.8.12 | |
Asterisk | =1.8.12.0-rc1 | |
Asterisk | =1.8.12.0-rc2 | |
Asterisk | =1.8.12.0-rc3 | |
Asterisk | <=10.4.0 | |
Asterisk | =10.0.0 | |
Asterisk | =10.0.0-beta1 | |
Asterisk | =10.0.0-beta2 | |
Asterisk | =10.0.0-rc1 | |
Asterisk | =10.0.0-rc2 | |
Asterisk | =10.0.0-rc3 | |
Asterisk | =10.1.0 | |
Asterisk | =10.1.0-rc1 | |
Asterisk | =10.1.0-rc2 | |
Asterisk | =10.2.0 | |
Asterisk | =10.2.0-rc1 | |
Asterisk | =10.2.0-rc2 | |
Asterisk | =10.2.0-rc3 | |
Asterisk | =10.2.0-rc4 | |
Asterisk | =10.3 | |
Asterisk | =10.3.0 | |
Asterisk | =10.3.0-rc2 | |
Asterisk | =10.3.0-rc3 | |
Asterisk | =10.4.0-rc1 | |
Asterisk | =10.4.0-rc2 | |
Asterisk | =10.4.0-rc3 | |
Asterisk | <=1.8.12.0 | |
Asterisk | <=10.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2948 is classified as a medium severity vulnerability that can lead to a denial of service due to a NULL pointer dereference.
To fix CVE-2012-2948, upgrade to Certified Asterisk 1.8.11-cert2 or later, or Asterisk Open Source 1.8.12.1 or later.
CVE-2012-2948 affects Certified Asterisk 1.8.11-cert before 1.8.11-cert2, Asterisk Open Source 1.8.x before 1.8.12.1, and 10.x before 10.4.1.
CVE-2012-2948 enables remote authenticated users to perform a denial of service attack by causing the daemon to crash.
There are no known workarounds for CVE-2012-2948; patching or upgrading is recommended.