Bug 826475 (CVE-2012-2948)
| Summary: | CVE-2012-2948 asterisk: Remote crash in Skinny channel driver (AST-2012-008) | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Jan Lieskovsky <jlieskov> |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED ERRATA | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | itamar, jeff, lmadsen, rbryant |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2021-10-19 21:53:37 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 826478, 826479 | ||
| Bug Blocks: | |||
This issue affects the versions of the asterisk package, as shipped with Fedora release of 15 and 16. Please schedule an update. -- This issue affects the version of the asterisk package, as shipped with Fedora EPEL 6. Please schedule an update. Created asterisk tracking bugs for this issue Affects: fedora-all [bug 826478] Affects: epel-6 [bug 826479] |
A denial of service flaw was found in the way Skinny protocol implementation / driver of the Asterisk, an open source telephony toolkit, performed SCCP connection close. An authenticated Asterisk user (with valid SCCP ID) could use this flaw to cause asterisk executable to crash (dereference NULL pointer) by closing the connection to the Asterisk server in certain call states ("Off hook" for example). References: [1] http://downloads.asterisk.org/pub/security/AST-2012-008.html [2] https://bugs.gentoo.org/show_bug.cgi?id=418191 Upstream ticket: [3] https://issues.asterisk.org/jira/browse/ASTERISK-19905 Upstream patches: [4] http://downloads.asterisk.org/pub/security/AST-2012-008-1.8.diff (against 1.8.x branch) [5] http://downloads.asterisk.org/pub/security/AST-2012-008-10.diff (against v1.10.x branch) [6] http://downloads.asterisk.org/pub/security/AST-2012-008-1.8.11-cert.diff (against v1.8.11-cert branch)