blob: d4d39ae27795fe8759c2a327cf3221e9a22d38fa [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200610-15">
<title>Asterisk: Multiple vulnerabilities</title>
Asterisk is vulnerable to the remote execution of arbitrary code or a
Denial of Service.
<product type="ebuild">asterisk</product>
<announced>October 30, 2006</announced>
<revised>January 30, 2007: 02</revised>
<package name="net-misc/asterisk" auto="yes" arch="*">
<unaffected range="ge">1.2.13</unaffected>
<unaffected range="rge">1.0.12</unaffected>
<vulnerable range="lt">1.2.13</vulnerable>
<vulnerable range="lt">1.0.12</vulnerable>
Asterisk is an open source implementation of a telephone private branch
exchange (PBX).
Asterisk contains buffer overflows in channels/chan_mgcp.c from the
MGCP driver and in channels/chan_skinny.c from the Skinny channel
driver for Cisco SCCP phones. It also dangerously handles
client-controlled variables to determine filenames in the Record()
function. Finally, the SIP channel driver in channels/chan_sip.c could
use more resources than necessary under unspecified circumstances.
<impact type="high">
A remote attacker could execute arbitrary code by sending a crafted
audit endpoint (AUEP) response, by sending an overly large Skinny
packet even before authentication, or by making use of format strings
specifiers through the client-controlled variables. An attacker could
also cause a Denial of Service by resource consumption through the SIP
channel driver.
There is no known workaround for the format strings vulnerability at
this time. You can comment the lines in /etc/asterisk/mgcp.conf,
/etc/asterisk/skinny.conf and /etc/asterisk/sip.conf to deactivate the
three vulnerable channel drivers. Please note that the MGCP channel
driver is disabled by default.
All Asterisk users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-misc/asterisk-1.2.13&quot;</code>
<uri link="">CVE-2006-4345</uri>
<uri link="">CVE-2006-4346</uri>
<uri link="">CVE-2006-5444</uri>
<uri link="">CVE-2006-5445</uri>
<metadata tag="submitter" timestamp="Wed, 18 Oct 2006 20:57:57 +0000">
<metadata tag="bugReady" timestamp="Sat, 21 Oct 2006 20:37:32 +0000">