---------- Mensagem encaminhada ----------
De: "Asterisk Security Team" <[email protected]>
Data: 28/01/2015 21:32
Assunto: [asterisk-dev] AST-2015-002: Mitigation for libcURL HTTP request
injection vulnerability
Para: <[email protected]>
Cc:

               Asterisk Project Security Advisory - AST-2015-002

         Product        Asterisk
         Summary        Mitigation for libcURL HTTP request injection
                        vulnerability
    Nature of Advisory  HTTP request injection
      Susceptibility    Remote Authenticated Sessions
         Severity       Major
      Exploits Known    No
       Reported On      12 January, 2015
       Reported By      Olle Johansson
        Posted On       January 12, 2015
     Last Updated On    January 28, 2015
     Advisory Contact   Mark Michelson <mmichelson AT digium DOT com>
         CVE Name       N/A.

    Description  CVE-2014-8150 reported an HTTP request injection
                 vulnerability in libcURL. Asterisk uses libcURL in its
                 func_curl.so module (the CURL() dialplan function), as well
                 as its res_config_curl.so (cURL realtime backend) modules.

                 Since Asterisk may be configured to allow for user-supplied
                 URLs to be passed to libcURL, it is possible that an
                 attacker could use Asterisk as an attack vector to inject
                 unauthorized HTTP requests if the version of libcURL
                 installed on the Asterisk server is affected by
                 CVE-2014-8150.

    Resolution  Asterisk has been patched with a similar patch as libcURL
                was for CVE-2014-8150. This means that carriage return and
                linefeed characters are forbidden from being in HTTP URLs
                that will be passed to libcURL.

                               Affected Versions
                         Product                       Release
                                                       Series
                   Asteris Open Source                  1.8.x   All versions
                  Asterisk Open Source                  11.x    All versions
                  Asterisk Open Source                  12.x    All versions
                  Asterisk Open Source                  13.x    All versions
                   Certified Asterisk                  1.8.28   All versions
                   Certified Asterisk                   11.6    All versions

                                  Corrected In
          Product                              Release
    Asterisk Open Source          1.8.32.2, 11.15.1, 12.8.1, 13.1.1
     Certified Asterisk               1.8.28-cert4, 11.6-cert10

                                      Patches
                                 SVN URL
 Revision
   http://downloads.asterisk.org/pub/security/AST-2015-002-1.8.28.diff
Certified

 Asterisk

 1.8.28
   http://downloads.asterisk.org/pub/security/AST-2015-002-11.6.diff
 Certified

 Asterisk
                                                                       11.6
   http://downloads.asterisk.org/pub/security/AST-2015-002-1.8.diff
Asterisk
                                                                       1.8
   http://downloads.asterisk.org/pub/security/AST-2015-002-11.diff
 Asterisk
                                                                       11
   http://downloads.asterisk.org/pub/security/AST-2015-002-12.diff
 Asterisk
                                                                       12
   http://downloads.asterisk.org/pub/security/AST-2015-002-13.diff
 Asterisk
                                                                       13

    Links  https://issues.asterisk.org/jira/browse/ASTERISK-24676

    Asterisk Project Security Advisories are posted at
    http://www.asterisk.org/security

    This document may be superseded by later versions; if so, the latest
    version will be posted at
    http://downloads.digium.com/pub/security/AST-2015-002.pdf and
    http://downloads.digium.com/pub/security/AST-2015-002.html

                                Revision History
          Date            Editor                  Revisions Made
    21 January, 2015  Mark Michelson  Initial creation of document

               Asterisk Project Security Advisory - AST-2015-002
              Copyright (c) 2015 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in
its
                           original, unaltered form.


--
_____________________________________________________________________
-- Bandwidth and Colocation Provided by http://www.api-digital.com --

asterisk-dev mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-dev
_______________________________________________
KHOMP: completa linha de placas externas FXO, FXS, GSM e E1
Media Gateways de 1 a 64 E1s para SIP com R2, ISDN e SS7
Intercomunicadores para acesso remoto via rede IP e telefones IP
Conheça todo o portfólio em www.Khomp.com
_______________________________________________
ALIGERA – Fabricante e desenvolvedor nacional de Soluções para telefonia IP .
Gateway Sip, Placas de 1E1, 2E1, 4E1 e 8E1 para PCI ou PCI Express.
Banco de Canais Analógicos  – Appliance Asterisk Acesse www.aligera.com.br
_______________________________________________
DIGIVOICE: Fabricante pioneiro em Banco de Canais e Placas E1, GSM, FXO e FXS 
para Asterisk e Elastix. Temos Cursos de Telefonia IP e Asterisk.
Construa soluções de PABX IP com produtos DigiVoice - visite  
www.digivoice.com.br
_______________________________________________
Para remover seu email desta lista, basta enviar um email em branco para 
[email protected]

Responder a