Package: asterisk Severity: critical Tags: security 3 of 4 problems seem to affect Etch and Sarge. Sid *may* be unaffected based on version number.
>From http://secunia.com/advisories/26099/ DESCRIPTION: Some vulnerabilities have been reported in Asterisk, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. 1) A boundary error exists in the Asterisk STUN implementation, which can be exploited to cause the application to crash via specially crafted RTP packets. Successful exploitation requires that the chan_sip, chan_gtalk, chan_jingle, chan_h323, chan_mgcp, or chan_skinny is enabled. The vulnerability is reported in the following products: Asterisk Open Source 1.4.x prior to version 1.4.8 AsteriskNOW pre-release prior to version beta7 Asterisk Appliance Developer Kit prior to version 0.5.0 s800i 1.0.x prior to version 1.0.2. 2) A boundary error exists in the Asterisk Skinny channel driver (chan_skinny), which can be exploited to cause the application to crash via packets that contain a size field smaller than the actual size of the packet. Successful exploitation requires that chan_skinny is enabled. 3) A NULL-pointer dereference error exists in the Asterisk IAX2 channel driver (chan_iax2), which can be exploited to cause a DoS via specially crafted LGRQ and LAGRP frames. Successful exploitation requires that chan_iax is enabled. 4) A boundary error exists in the Asterisk IAX2 channel driver (chan_iax2) within the handling of RTP frames. This can be exploited to cause a stack-based buffer overflow by sending large data payloads (more than 4096 bytes) in a voice or video frame. Successful exploitation of this vulnerability allows execution of arbitrary code, but requires that the system is configured to connect channels that use RTP and IAX channels. Vulnerabilities #2, #3, and #4 are reported in the following products: Asterisk Open Source 1.0.x Asterisk Open Source 1.2.x prior to version 1.2.22 Asterisk Open Source 1.4.x prior to version 1.4.8 AsteriskNOW pre-release prior to version beta7 Asterisk Business Edition A.x.x Asterisk Business Edition B.x.x prior to version B.2.2.1 Asterisk Appliance Developer Kit prior to version 0.5.0 s800i 1.0.x prior to version 1.0.2. SOLUTION: Asterisk Open Source 1.2.x: Update to version 1.2.22. ftp://ftp.digium.com/pub/telephony/asterisk Asterisk Open Source 1.4.x: Update to version 1.4.8. ftp://ftp.digium.com/pub/telephony/asterisk -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (900, 'unstable'), (5, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.22-rc1 (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages asterisk depends on: pn asterisk-config <none> (no description available) pn asterisk-sounds-main <none> (no description available) ii libasound2 1.0.14a-2 ALSA library ii libc6 2.6-2 GNU C Library: Shared libraries ii libgsm1 1.0.10-13 Shared libraries for GSM speech co ii libncurses5 5.6+20070716-1 Shared libraries for terminal hand pn libnewt0.51 <none> (no description available) pn libpq3 <none> (no description available) pn libpri1 <none> (no description available) ii libspeex1 1.1.12-3 The Speex Speech Codec ii libsqlite0 2.8.17-2 SQLite shared library pn libssl0.9.7 <none> (no description available) pn libtonezone1 <none> (no description available) ii unixodbc 2.2.11-15 ODBC tools libraries ii zlib1g 1:1.2.3.3.dfsg-5 compression library - runtime asterisk recommends no packages. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]