Debian Security Advisory DSA 1229-1 (asterisk)

Summary
The remote host is missing an update to asterisk announced via advisory DSA 1229-1. Adam Boileau discovered an integer overflow in the Skinny channel driver in Asterisk, an Open Source Private Branch Exchange or telephone system, as used by Cisco SCCP phones, which allows remote attackers to execute arbitrary code.
Solution
For the stable distribution (sarge) this problem has been fixed in version 1.0.7.dfsg.1-2sarge4. For the unstable distribution (sid) this problem has been fixed in version 1.2.13~dfsg-1. We recommend that you upgrade your asterisk packages. https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201229-1