Check Point Reference: | CPAI-2012-278 |
Date Published: | 27 Aug 2012 |
Severity: | High |
Last Updated: | Thursday 21 November, 2024 |
Source: | CVE-2012-2415 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | Digium Asterisk Open Source 1.6.x prior to 1.6.2.24 |
Vulnerability Description | A heap buffer overflow vulnerability has been reported in Digium Asterisk. |
Vulnerability Details | The vulnerability is due to a bounds checking error while processing certain events in the Skinny channel driver. A remote attacker can exploit this vulnerability by sending a sequence of messages to the target. Successful exploitation would allow an attacker to execute code on the target system. |
This protection will detect and block a sequence of messages sent to the server.
In order for the protection to be activated, update your product to the latest update. For information on how to update , go to SBP-2006-05, Protection tab and select the version of your choice.
SmartView Tracker will log the following entries:
Attack Name: VoIP Enforcement Violation
Attack Information: Digium Asterisk Skinny Channel Driver Heap Buffer Overflow