CVE-2006-5444
Digium Asterisk - Buffer Overflow
Title source: ruleDescription
Integer overflow in the get_input function in the Skinny channel driver (chan_skinny.c) in Asterisk 1.0.x before 1.0.12 and 1.2.x before 1.2.13, as used by Cisco SCCP phones, allows remote attackers to execute arbitrary code via a certain dlen value that passes a signed integer comparison and leads to a heap-based buffer overflow.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Noam Rathaus · perldosmultiple
https://www.exploit-db.com/exploits/2597
References (19)
Scores
EPSS
0.8706
EPSS Percentile
99.4%
Details
Status
published
Products (26)
digium/asterisk
0.1.7
digium/asterisk
0.1.8
digium/asterisk
0.1.9
digium/asterisk
0.1.9.1
digium/asterisk
0.2
digium/asterisk
0.3
digium/asterisk
0.4
digium/asterisk
0.7
digium/asterisk
0.7.1
digium/asterisk
0.7.2
... and 16 more
Published
Oct 23, 2006
Tracked Since
Feb 18, 2026