FKIE_CVE-2012-3553
Vulnerability from fkie_nvd - Published: 2012-06-19 20:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
chan_skinny.c in the Skinny (aka SCCP) channel driver in Asterisk Open Source 10.x before 10.5.1 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by sending a Station Key Pad Button message and closing a connection in off-hook mode, a related issue to CVE-2012-2948.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| digium | asterisk | 10.0.0 | |
| digium | asterisk | 10.0.0 | |
| digium | asterisk | 10.0.0 | |
| digium | asterisk | 10.0.0 | |
| digium | asterisk | 10.0.0 | |
| digium | asterisk | 10.0.0 | |
| digium | asterisk | 10.0.1 | |
| digium | asterisk | 10.1.0 | |
| digium | asterisk | 10.1.0 | |
| digium | asterisk | 10.1.0 | |
| digium | asterisk | 10.1.1 | |
| digium | asterisk | 10.1.2 | |
| digium | asterisk | 10.1.3 | |
| digium | asterisk | 10.2.0 | |
| digium | asterisk | 10.2.0 | |
| digium | asterisk | 10.2.0 | |
| digium | asterisk | 10.2.0 | |
| digium | asterisk | 10.2.0 | |
| digium | asterisk | 10.2.1 | |
| digium | asterisk | 10.3.0 | |
| digium | asterisk | 10.3.0 | |
| digium | asterisk | 10.3.0 | |
| digium | asterisk | 10.3.1 | |
| digium | asterisk | 10.4.0 | |
| digium | asterisk | 10.4.0 | |
| digium | asterisk | 10.4.0 | |
| digium | asterisk | 10.4.0 | |
| digium | asterisk | 10.4.1 | |
| digium | asterisk | 10.4.2 | |
| digium | asterisk | 10.5.0 | |
| digium | asterisk | 10.5.0 | |
| digium | asterisk | 10.5.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "687ED3CE-67C4-410D-8AF4-C769015598F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "30E918CD-89C4-42DA-9709-E50E0A3FA736",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "DA57FA15-D0D7-4A97-9C25-6F6566940098",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A1C45300-A2CF-40E7-AB67-23DC24C31A1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "958081DC-1D77-45CD-A940-C7A1AB42C7BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "298A879D-4F65-4523-A752-D17C4F81B822",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "37AB07BE-54C4-4972-A05F-D1E2CF4363CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EBC63564-A84E-463D-8312-DDF1C6B7796F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "62A0906E-B631-4F3A-9ABC-9A43A43220BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C6314ADA-2849-416D-966E-C01C322EF904",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8B6CB1DD-614A-4B3D-99AE-9B1341427024",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CC95B04F-3746-4F1C-8428-A1FA10253E14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "20819080-E0AB-4879-B4CF-A154D6F7EF6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C6C45753-E2CC-4F7C-B8DA-3D8CF255EA22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "5A080197-D6AA-4FDC-888E-51D1C8251E34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "1F08D930-D4C1-4C63-875C-171C46AE97C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "1AA43D7D-AEAD-47CB-BFA5-B73004A1A7A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc4:*:*:*:*:*:*",
"matchCriteriaId": "B5ED5F6F-166D-4610-8939-A33AD45F1ADE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1D40002A-564E-425C-BA2A-7C4A8F8DAFD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "521C4DB2-7127-4BA9-94FC-AB0E9E06FE2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "8C905DC1-8AB8-4D83-BB5B-FA4DABC58229",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "ECC74B5D-97A1-46FF-AFA3-5D5E4A0BF3A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F2D98C7C-94A8-4348-AF22-04A41FB6F8EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "85D39A99-E9A6-4860-BC61-56CA2FC3238B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "845DA0A4-1983-4E82-99C8-B7FBF47C632E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "5A63FBB7-F1CF-4603-848F-980742D2ED36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "10B2084F-3AF4-4008-899C-6C1E43715201",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "217C13A5-9F8A-4392-858F-2FC88B03EB0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6B282462-900C-492E-98DE-65364E62F5E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "687784F0-9ACC-435D-81F9-1E1B0F61010C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "9D7D020C-FE32-408B-BE37-58835FD3D95F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "39B7938F-7370-4F67-B0CD-1C14DE2E4E7B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "chan_skinny.c in the Skinny (aka SCCP) channel driver in Asterisk Open Source 10.x before 10.5.1 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by sending a Station Key Pad Button message and closing a connection in off-hook mode, a related issue to CVE-2012-2948."
},
{
"lang": "es",
"value": "chan_skinny.c en el controlador de canal de Skinny (alias SCCP) en Asterisk Open Source v10.x antes v10.5.1 permite a usuarios remotos autenticados provocar una denegaci\u00f3n de servicio (eliminar la referencia del puntero NULL y ca\u00edda demonio) mediante el env\u00edo de un mensaje Station Key Pad Button y el cierre de una conexi\u00f3n en modo descolgado, un tema relacionado con CVE-2012-2948."
}
],
"evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\r\n\r\n\u0027CWE-476: NULL Pointer Dereference\u0027",
"id": "CVE-2012-3553",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-06-19T20:55:07.973",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://downloads.asterisk.org/pub/security/AST-2012-009.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://downloads.asterisk.org/pub/security/AST-2012-009.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…