![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2012-2415 |
Description: | Heap-based buffer overflow in chan_skinny.c in the Skinny channel driver in Asterisk Open Source 1.6.2.x before 1.6.2.24, 1.8.x before 1.8.11.1, and 10.x before 10.3.1 allows remote authenticated users to cause a denial of service or possibly have unspecified other impact via a series of KEYPAD_BUTTON_MESSAGE events. |
Test IDs: | 1.3.6.1.4.1.25623.1.0.71262 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-2415 BugTraq ID: 53210 http://www.securityfocus.com/bid/53210 Debian Security Information: DSA-2460 (Google Search) http://www.debian.org/security/2012/dsa-2460 http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079759.html http://osvdb.org/81455 http://www.securitytracker.com/id?1026962 http://secunia.com/advisories/48891 http://secunia.com/advisories/48941 XForce ISS Database: asterisk-skinny-driver-bo(75102) https://exchange.xforce.ibmcloud.com/vulnerabilities/75102 |