cve-2012-3553
Vulnerability from cvelistv5
Published
2012-06-19 20:00
Modified
2024-09-17 04:25
Severity ?
EPSS score ?
Summary
chan_skinny.c in the Skinny (aka SCCP) channel driver in Asterisk Open Source 10.x before 10.5.1 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by sending a Station Key Pad Button message and closing a connection in off-hook mode, a related issue to CVE-2012-2948.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:13:50.590Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.asterisk.org/pub/security/AST-2012-009.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "chan_skinny.c in the Skinny (aka SCCP) channel driver in Asterisk Open Source 10.x before 10.5.1 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by sending a Station Key Pad Button message and closing a connection in off-hook mode, a related issue to CVE-2012-2948." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-06-19T20:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.asterisk.org/pub/security/AST-2012-009.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-3553", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "chan_skinny.c in the Skinny (aka SCCP) channel driver in Asterisk Open Source 10.x before 10.5.1 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by sending a Station Key Pad Button message and closing a connection in off-hook mode, a related issue to CVE-2012-2948." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://downloads.asterisk.org/pub/security/AST-2012-009.html", "refsource": "CONFIRM", "url": "http://downloads.asterisk.org/pub/security/AST-2012-009.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-3553", "datePublished": "2012-06-19T20:00:00Z", "dateReserved": "2012-06-14T00:00:00Z", "dateUpdated": "2024-09-17T04:25:46.308Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2012-3553\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2012-06-19T20:55:07.973\",\"lastModified\":\"2024-11-21T01:41:07.003\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"chan_skinny.c in the Skinny (aka SCCP) channel driver in Asterisk Open Source 10.x before 10.5.1 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by sending a Station Key Pad Button message and closing a connection in off-hook mode, a related issue to CVE-2012-2948.\"},{\"lang\":\"es\",\"value\":\"chan_skinny.c en el controlador de canal de Skinny (alias SCCP) en Asterisk Open Source v10.x antes v10.5.1 permite a usuarios remotos autenticados provocar una denegaci\u00f3n de servicio (eliminar la referencia del puntero NULL y ca\u00edda demonio) mediante el env\u00edo de un mensaje Station Key Pad Button y el cierre de una conexi\u00f3n en modo descolgado, un tema relacionado con CVE-2012-2948.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:N/I:N/A:P\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"687ED3CE-67C4-410D-8AF4-C769015598F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.0.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"30E918CD-89C4-42DA-9709-E50E0A3FA736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.0.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA57FA15-D0D7-4A97-9C25-6F6566940098\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.0.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1C45300-A2CF-40E7-AB67-23DC24C31A1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.0.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"958081DC-1D77-45CD-A940-C7A1AB42C7BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.0.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"298A879D-4F65-4523-A752-D17C4F81B822\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37AB07BE-54C4-4972-A05F-D1E2CF4363CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBC63564-A84E-463D-8312-DDF1C6B7796F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.1.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"62A0906E-B631-4F3A-9ABC-9A43A43220BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.1.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6314ADA-2849-416D-966E-C01C322EF904\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B6CB1DD-614A-4B3D-99AE-9B1341427024\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC95B04F-3746-4F1C-8428-A1FA10253E14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20819080-E0AB-4879-B4CF-A154D6F7EF6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6C45753-E2CC-4F7C-B8DA-3D8CF255EA22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.2.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A080197-D6AA-4FDC-888E-51D1C8251E34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.2.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F08D930-D4C1-4C63-875C-171C46AE97C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.2.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AA43D7D-AEAD-47CB-BFA5-B73004A1A7A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.2.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5ED5F6F-166D-4610-8939-A33AD45F1ADE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D40002A-564E-425C-BA2A-7C4A8F8DAFD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"521C4DB2-7127-4BA9-94FC-AB0E9E06FE2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.3.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C905DC1-8AB8-4D83-BB5B-FA4DABC58229\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.3.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECC74B5D-97A1-46FF-AFA3-5D5E4A0BF3A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2D98C7C-94A8-4348-AF22-04A41FB6F8EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85D39A99-E9A6-4860-BC61-56CA2FC3238B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.4.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"845DA0A4-1983-4E82-99C8-B7FBF47C632E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.4.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A63FBB7-F1CF-4603-848F-980742D2ED36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.4.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"10B2084F-3AF4-4008-899C-6C1E43715201\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"217C13A5-9F8A-4392-858F-2FC88B03EB0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B282462-900C-492E-98DE-65364E62F5E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"687784F0-9ACC-435D-81F9-1E1B0F61010C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.5.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D7D020C-FE32-408B-BE37-58835FD3D95F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.5.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"39B7938F-7370-4F67-B0CD-1C14DE2E4E7B\"}]}]}],\"references\":[{\"url\":\"http://downloads.asterisk.org/pub/security/AST-2012-009.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://downloads.asterisk.org/pub/security/AST-2012-009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}],\"evaluatorComment\":\"Per: http://cwe.mitre.org/data/definitions/476.html\\r\\n\\r\\n\u0027CWE-476: NULL Pointer Dereference\u0027\"}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.