Vulnerabilities > CVE-2006-4345 - Unspecified vulnerability in Digium Asterisk
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN digium
nessus
Summary
Stack-based buffer overflow in channels/chan_mgcp.c in MGCP in Asterisk 1.0 through 1.2.10 allows remote attackers to execute arbitrary code via a crafted audit endpoint (AUEP) response.
Vulnerable Configurations
Nessus
NASL family | Gentoo Local Security Checks |
NASL id | GENTOO_GLSA-200610-15.NASL |
description | The remote host is affected by the vulnerability described in GLSA-200610-15 (Asterisk: Multiple vulnerabilities) Asterisk contains buffer overflows in channels/chan_mgcp.c from the MGCP driver and in channels/chan_skinny.c from the Skinny channel driver for Cisco SCCP phones. It also dangerously handles client-controlled variables to determine filenames in the Record() function. Finally, the SIP channel driver in channels/chan_sip.c could use more resources than necessary under unspecified circumstances. Impact : A remote attacker could execute arbitrary code by sending a crafted audit endpoint (AUEP) response, by sending an overly large Skinny packet even before authentication, or by making use of format strings specifiers through the client-controlled variables. An attacker could also cause a Denial of Service by resource consumption through the SIP channel driver. Workaround : There is no known workaround for the format strings vulnerability at this time. You can comment the lines in /etc/asterisk/mgcp.conf, /etc/asterisk/skinny.conf and /etc/asterisk/sip.conf to deactivate the three vulnerable channel drivers. Please note that the MGCP channel driver is disabled by default. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 22930 |
published | 2006-10-31 |
reporter | This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/22930 |
title | GLSA-200610-15 : Asterisk: Multiple vulnerabilities |
code |
|
References
- http://labs.musecurity.com/advisories/MU-200608-01.txt
- http://ftp.digium.com/pub/asterisk/ChangeLog-1.2.11
- http://www.securityfocus.com/bid/19683
- http://securitytracker.com/id?1016742
- http://www.sineapps.com/news.php?rssid=1448
- http://secunia.com/advisories/21600
- http://www.gentoo.org/security/en/glsa/glsa-200610-15.xml
- http://secunia.com/advisories/22651
- http://www.vupen.com/english/advisories/2006/3372
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28542
- http://www.securityfocus.com/archive/1/444322/100/0/threaded