Gentoo Archives: gentoo-announce

From: Sune Kloppenborg Jeppesen <jaervosz@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200704-01 ] Asterisk: Two SIP Denial of Service vulnerabilities
Date: Mon, 02 Apr 2007 20:20:20
Message-Id: 200704022150.16438.jaervosz@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200704-01
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Asterisk: Two SIP Denial of Service vulnerabilities
9 Date: April 02, 2007
10 Bugs: #171467
11 ID: 200704-01
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Asterisk is vulnerable to two Denial of Service issues in the SIP
19 channel.
20
21 Background
22 ==========
23
24 Asterisk is an open source implementation of a telephone private branch
25 exchange (PBX).
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 net-misc/asterisk < 1.2.14-r2 >= 1.2.14-r2
34 *>= 1.0.12-r2
35
36 Description
37 ===========
38
39 The Madynes research team at INRIA has discovered that Asterisk
40 contains a null pointer dereferencing error in the SIP channel when
41 handling INVITE messages. Furthermore qwerty1979 discovered that
42 Asterisk 1.2.x fails to properly handle SIP responses with return code
43 0.
44
45 Impact
46 ======
47
48 A remote attacker could cause an Asterisk server listening for SIP
49 messages to crash by sending a specially crafted SIP message or
50 answering with a 0 return code.
51
52 Workaround
53 ==========
54
55 There is no known workaround at this time.
56
57 Resolution
58 ==========
59
60 All Asterisk users should upgrade to the latest version:
61
62 # emerge --sync
63 # emerge --ask --oneshot --verbose net-misc/asterisk
64
65 Note: Asterisk 1.0.x is no longer supported upstream so users should
66 consider upgrading to Asterisk 1.2.x.
67
68 References
69 ==========
70
71 [ 1 ] CVE-2007-1561
72 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1561
73 [ 2 ] CVE-2007-1594
74 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1594
75
76 Availability
77 ============
78
79 This GLSA and any updates to it are available for viewing at
80 the Gentoo Security Website:
81
82 http://security.gentoo.org/glsa/glsa-200704-01.xml
83
84 Concerns?
85 =========
86
87 Security is a primary focus of Gentoo Linux and ensuring the
88 confidentiality and security of our users machines is of utmost
89 importance to us. Any security concerns should be addressed to
90 security@g.o or alternatively, you may file a bug at
91 http://bugs.gentoo.org.
92
93 License
94 =======
95
96 Copyright 2007 Gentoo Foundation, Inc; referenced text
97 belongs to its owner(s).
98
99 The contents of this document are licensed under the
100 Creative Commons - Attribution / Share Alike license.
101
102 http://creativecommons.org/licenses/by-sa/2.5