Digium Asterisk Skinny Channel Driver Heap Buffer Overflow (CVE-2012-2415)
|Check Point Reference:||CPAI-2012-278|
|Protection Provided by:||
Who is Vulnerable?
Digium Asterisk Open Source 1.6.x prior to 18.104.22.168
A heap buffer overflow vulnerability has been reported in Digium Asterisk.
The vulnerability is due to a bounds checking error while processing certain events in the Skinny channel driver. A remote attacker can exploit this vulnerability by sending a sequence of messages to the target. Successful exploitation would allow an attacker to execute code on the target system.
This protection will detect and block a sequence of messages sent to the server.
In order for the protection to be activated, update your product to the latest update. For information on how to update , go to SBP-2006-05, Protection tab and select the version of your choice.
To configure the defense, select your product from the list below and follow the related protection steps.
Security Gateway R75 / R71 / R70
How Can I Protect My Network?
- In the IPS tab, click Protections and find the Digium Asterisk Skinny Channel Driver Heap Buffer Overflow protection using the Search tool and Edit the protection's settings.
- Install policy on all modules.
How Do I Know if My Network is Under Attack?
SmartView Tracker will log the following entries:
Attack Name: VoIP Enforcement Violation
Attack Information: Digium Asterisk Skinny Channel Driver Heap Buffer Overflow