4
CVE-2012-2948
- EPSS 3.93%
- Veröffentlicht 02.06.2012 15:55:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
- Quelle cve@mitre.org
- Teams Watchlist Login
- Unerledigt Login
chan_skinny.c in the Skinny (aka SCCP) channel driver in Certified Asterisk 1.8.11-cert before 1.8.11-cert2 and Asterisk Open Source 1.8.x before 1.8.12.1 and 10.x before 10.4.1 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by closing a connection in off-hook mode.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Asterisk ≫ Certified Asterisk Version1.8.11 Updatecert
Asterisk ≫ Certified Asterisk Version1.8.11 Updatecert1
Asterisk ≫ Open Source Version1.8.0
Asterisk ≫ Open Source Version1.8.0 Updatebeta1
Asterisk ≫ Open Source Version1.8.0 Updatebeta2
Asterisk ≫ Open Source Version1.8.0 Updatebeta3
Asterisk ≫ Open Source Version1.8.0 Updatebeta4
Asterisk ≫ Open Source Version1.8.0 Updatebeta5
Asterisk ≫ Open Source Version1.8.0 Updaterc1
Asterisk ≫ Open Source Version1.8.0 Updaterc2
Asterisk ≫ Open Source Version1.8.0 Updaterc3
Asterisk ≫ Open Source Version1.8.0 Updaterc4
Asterisk ≫ Open Source Version1.8.0 Updaterc5
Asterisk ≫ Open Source Version1.8.1
Asterisk ≫ Open Source Version1.8.1 Updaterc1
Asterisk ≫ Open Source Version1.8.2
Asterisk ≫ Open Source Version1.8.2 Updaterc1
Asterisk ≫ Open Source Version1.8.3 Updaterc1
Asterisk ≫ Open Source Version1.8.5 Updaterc1
Asterisk ≫ Open Source Version1.8.5.0
Asterisk ≫ Open Source Version1.8.6.0
Asterisk ≫ Open Source Version1.8.6.0 Updaterc1
Asterisk ≫ Open Source Version1.8.6.0 Updaterc2
Asterisk ≫ Open Source Version1.8.6.0 Updaterc3
Asterisk ≫ Open Source Version1.8.7.0
Asterisk ≫ Open Source Version1.8.7.0 Updaterc1
Asterisk ≫ Open Source Version1.8.7.0 Updaterc2
Asterisk ≫ Open Source Version1.8.8.0
Asterisk ≫ Open Source Version1.8.8.0 Updaterc1
Asterisk ≫ Open Source Version1.8.8.0 Updaterc2
Asterisk ≫ Open Source Version1.8.8.0 Updaterc3
Asterisk ≫ Open Source Version1.8.8.0 Updaterc4
Asterisk ≫ Open Source Version1.8.8.0 Updaterc5
Asterisk ≫ Open Source Version1.8.9.0
Asterisk ≫ Open Source Version1.8.9.0 Updaterc1
Asterisk ≫ Open Source Version1.8.9.0 Updaterc2
Asterisk ≫ Open Source Version1.8.9.0 Updaterc3
Asterisk ≫ Open Source Version1.8.10.0
Asterisk ≫ Open Source Version1.8.10.0 Updaterc1
Asterisk ≫ Open Source Version1.8.10.0 Updaterc2
Asterisk ≫ Open Source Version1.8.10.0 Updaterc3
Asterisk ≫ Open Source Version1.8.10.0 Updaterc4
Asterisk ≫ Open Source Version1.8.11.0
Asterisk ≫ Open Source Version1.8.11.0 Updaterc2
Asterisk ≫ Open Source Version1.8.11.0 Updaterc3
Asterisk ≫ Open Source Version1.8.12
Asterisk ≫ Open Source Version1.8.12.0 Updaterc1
Asterisk ≫ Open Source Version1.8.12.0 Updaterc2
Asterisk ≫ Open Source Version1.8.12.0 Updaterc3
Asterisk ≫ Open Source Version10.0.0
Asterisk ≫ Open Source Version10.0.0 Updatebeta1
Asterisk ≫ Open Source Version10.0.0 Updatebeta2
Asterisk ≫ Open Source Version10.0.0 Updaterc1
Asterisk ≫ Open Source Version10.0.0 Updaterc2
Asterisk ≫ Open Source Version10.0.0 Updaterc3
Asterisk ≫ Open Source Version10.1.0
Asterisk ≫ Open Source Version10.1.0 Updaterc1
Asterisk ≫ Open Source Version10.1.0 Updaterc2
Asterisk ≫ Open Source Version10.2.0
Asterisk ≫ Open Source Version10.2.0 Updaterc1
Asterisk ≫ Open Source Version10.2.0 Updaterc2
Asterisk ≫ Open Source Version10.2.0 Updaterc3
Asterisk ≫ Open Source Version10.2.0 Updaterc4
Asterisk ≫ Open Source Version10.3
Asterisk ≫ Open Source Version10.3.0
Asterisk ≫ Open Source Version10.3.0 Updaterc2
Asterisk ≫ Open Source Version10.3.0 Updaterc3
Asterisk ≫ Open Source Version10.4.0 Updaterc1
Asterisk ≫ Open Source Version10.4.0 Updaterc2
Asterisk ≫ Open Source Version10.4.0 Updaterc3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 3.93% | 0.872 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 4 | 8 | 2.9 |
AV:N/AC:L/Au:S/C:N/I:N/A:P
|