Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

APP:DIGIUM-ASTERISK-SKINNY-DOS

Severity

High

Recommended

No

Recommended Action

Drop

Category

APP

Keywords

Digium Asterisk Skinny Channel NULL-Pointer Dereference Denial of Service

Release Date

2013/01/08

Update Number

2223

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP: Digium Asterisk Skinny Channel NULL-Pointer Dereference Denial of Service


This signature detects attempts to exploit a known vulnerability against Digium Asterisk. A successful attack can result in a denial-of-service condition.

Extended Description

Asterisk is prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to trigger a NULL-pointer dereference and cause a system crash, denying service to legitimate users.

Affected Products

  • Asterisk 10.0.0
  • Asterisk 10.0.1
  • Asterisk 10.2.0
  • Asterisk 10.2.1
  • Asterisk 10.3.0
  • Asterisk 10.3.1
  • Asterisk 1.8.0
  • Asterisk 1.8.1
  • Asterisk 1.8.10.0
  • Asterisk 1.8.10.1
  • Asterisk 1.8.11.0
  • Asterisk 1.8.11.1
  • Asterisk 1.8.1.2
  • Asterisk 1.8.2.1
  • Asterisk 1.8.2.4
  • Asterisk 1.8.3.1
  • Asterisk 1.8.3.3
  • Asterisk 1.8.4.1
  • Asterisk 1.8.4 2
  • Asterisk 1.8.4.3
  • Asterisk 1.8.4.4
  • Asterisk 1.8.7.1
  • Asterisk 1.8.7.2
  • Asterisk 1.8.8.2
  • Asterisk Certified Asterisk 1.8.11-cert1
  • Debian Linux 6.0 amd64
  • Debian Linux 6.0 arm
  • Debian Linux 6.0 ia-32
  • Debian Linux 6.0 ia-64
  • Debian Linux 6.0 mips
  • Debian Linux 6.0 powerpc
  • Debian Linux 6.0 s/390
  • Debian Linux 6.0 sparc
  • Gentoo Linux

References

  • BugTraq: 53723
  • BugTraq: 53210
  • CVE: CVE-2012-2948
  • CVE: CVE-2012-2415

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out