Hi Luciano,

I applied DSA 2276-1 to my Lenny/i386 system, and asterisk suddenly wouldn't
start anymore. Reboot did not help. This is a production Asterisk system
where "nothing" is ever changed, other than the Asterisk config (which also
hasn't changed for six months). I never had any issues with any updates
since the system went live just after Lenny became stable.

I examined /var/log/messages, and nothing shows on asterisk that didn't show
before. Asterisk seems to start, but it doesn't show in the process list
afterward.

Could this be a regression?

As this is a production system, I did not examine the problem for more than
5 minutes (two reboots, a couple attempts at /etc/init.d/asterisk restart,
looking at /var/log/messages), and then rolled back the last full disk
backup.

If you want me to do any tests this will be difficult during the work week
(this is a critical production system), but I probably can shedule them over
the next weekend.

Thanks,

- Jan Joris -

On Sun, Jul 10, 2011 at 17:17, Luciano Bello <[email protected]> wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> - -------------------------------------------------------------------------
> Debian Security Advisory DSA-2276-1                   [email protected]
> http://www.debian.org/security/                             Luciano Bello
> July 10, 2011                          http://www.debian.org/security/faq
> - -------------------------------------------------------------------------
>
> Package        : asterisk
> Vulnerability  : multiple denial of service
> Problem type   : remote
> Debian-specific: no
> CVE ID         : CVE-2011-2529 CVE-2011-2535
> Debian Bug     : 631445 631446 631448
>
> Paul Belanger reported a vulnerability in Asterisk identified as
> AST-2011-008
> (CVE-2011-2529) through which an unauthenticated attacker may crash an
> Asterisk
> server remotely. A package containing a null char causes the SIP header
> parser
> to alter unrelated memory structures.
>
> Jared Mauch reported a vulnerability in Asterisk identified as AST-2011-009
> through which an unauthenticated attacker may crash an Asterisk server
> remotely.
> If a user sends a package with a Contact header with a missing left angle
> bracket (<) the server will crash. A possible workaround is to disable
> chan_sip.
>
> The vulnerability identified as AST-2011-010 (CVE-2011-2535) reported about
> an
> input validation error in the IAX2 channel driver. An unauthenticated
> attacker
> may crash an Asterisk server remotely by sending a crafted option control
> frame.
>
>
> For the oldstable distribution (lenny), this problem has been fixed in
> version 1.4.21.2~dfsg-3+lenny3.
>
> For the stable distribution (squeeze), this problem has been fixed in
> version 1.6.2.9-2+squeeze3.
>
> For the testing distribution (wheezy), this problem has been fixed in
> version 1:1.8.4.3-1.
>
> For the unstable distribution (sid), this problem has been fixed in
> version 1:1.8.4.3-1.
>
> We recommend that you upgrade your asterisk packages.
>
> Further information about Debian Security Advisories, how to apply
> these updates to your system and frequently asked questions can be
> found at: http://www.debian.org/security/
>
> Mailing list: [email protected]
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.11 (GNU/Linux)
>
> iEYEARECAAYFAk4Zwm8ACgkQHYflSXNkfP+G9QCgmlIDAuhXZSFFYspmaJkvt8uS
> gwkAnRduatGpgQo19s7RuEOspPIgOtlE
> =RXeA
> -----END PGP SIGNATURE-----
>
>
> --
> To UNSUBSCRIBE, email to [email protected]
> with a subject of "unsubscribe". Trouble? Contact
> [email protected]
> Archive: http://lists.debian.org/[email protected]
>
>


-- 
Jan Joris Vereijken / [email protected] / +31 6 2128 0372

Reply via email to