CVE-2012-3553
Published Jun 19, 2012
Last updated 12 years ago
Overview
- Description
- chan_skinny.c in the Skinny (aka SCCP) channel driver in Asterisk Open Source 10.x before 10.5.1 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by sending a Station Key Pad Button message and closing a connection in off-hook mode, a related issue to CVE-2012-2948.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4
- Impact score
- 2.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Evaluator
- Comment
- Per: http://cwe.mitre.org/data/definitions/476.html 'CWE-476: NULL Pointer Dereference'
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "687ED3CE-67C4-410D-8AF4-C769015598F3" }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "30E918CD-89C4-42DA-9709-E50E0A3FA736" }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA57FA15-D0D7-4A97-9C25-6F6566940098" }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A1C45300-A2CF-40E7-AB67-23DC24C31A1D" }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "958081DC-1D77-45CD-A940-C7A1AB42C7BA" }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "298A879D-4F65-4523-A752-D17C4F81B822" }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "37AB07BE-54C4-4972-A05F-D1E2CF4363CC" }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EBC63564-A84E-463D-8312-DDF1C6B7796F" }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "62A0906E-B631-4F3A-9ABC-9A43A43220BD" }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6314ADA-2849-416D-966E-C01C322EF904" }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B6CB1DD-614A-4B3D-99AE-9B1341427024" }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC95B04F-3746-4F1C-8428-A1FA10253E14" }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "20819080-E0AB-4879-B4CF-A154D6F7EF6F" }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6C45753-E2CC-4F7C-B8DA-3D8CF255EA22" }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A080197-D6AA-4FDC-888E-51D1C8251E34" }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F08D930-D4C1-4C63-875C-171C46AE97C1" }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1AA43D7D-AEAD-47CB-BFA5-B73004A1A7A1" }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5ED5F6F-166D-4610-8939-A33AD45F1ADE" }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D40002A-564E-425C-BA2A-7C4A8F8DAFD7" }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "521C4DB2-7127-4BA9-94FC-AB0E9E06FE2B" }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C905DC1-8AB8-4D83-BB5B-FA4DABC58229" }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ECC74B5D-97A1-46FF-AFA3-5D5E4A0BF3A1" }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F2D98C7C-94A8-4348-AF22-04A41FB6F8EB" }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "85D39A99-E9A6-4860-BC61-56CA2FC3238B" }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "845DA0A4-1983-4E82-99C8-B7FBF47C632E" }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A63FBB7-F1CF-4603-848F-980742D2ED36" }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10B2084F-3AF4-4008-899C-6C1E43715201" }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "217C13A5-9F8A-4392-858F-2FC88B03EB0E" }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B282462-900C-492E-98DE-65364E62F5E3" }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "687784F0-9ACC-435D-81F9-1E1B0F61010C" }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D7D020C-FE32-408B-BE37-58835FD3D95F" }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39B7938F-7370-4F67-B0CD-1C14DE2E4E7B" } ], "operator": "OR" } ] } ]