CVE-2006-5444

Digium Asterisk - Buffer Overflow

Title source: rule

Description

Integer overflow in the get_input function in the Skinny channel driver (chan_skinny.c) in Asterisk 1.0.x before 1.0.12 and 1.2.x before 1.2.13, as used by Cisco SCCP phones, allows remote attackers to execute arbitrary code via a certain dlen value that passes a signed integer comparison and leads to a heap-based buffer overflow.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Noam Rathaus · perldosmultiple
https://www.exploit-db.com/exploits/2597

Scores

EPSS 0.8706
EPSS Percentile 99.4%

Details

Status published
Products (26)
digium/asterisk 0.1.7
digium/asterisk 0.1.8
digium/asterisk 0.1.9
digium/asterisk 0.1.9.1
digium/asterisk 0.2
digium/asterisk 0.3
digium/asterisk 0.4
digium/asterisk 0.7
digium/asterisk 0.7.1
digium/asterisk 0.7.2
... and 16 more
Published Oct 23, 2006
Tracked Since Feb 18, 2026