Gentoo Archives: gentoo-announce

From: Sean Amoss <ackle@g.o>
To: gentoo-announce@g.o
Subject: [gentoo-announce] [ GLSA 201209-15 ] Asterisk: Multiple vulnerabilities
Date: Wed, 26 Sep 2012 22:11:49
Message-Id: 50637AFC.9080900@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201209-15
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Asterisk: Multiple vulnerabilities
9 Date: September 26, 2012
10 Bugs: #425050, #433750
11 ID: 201209-15
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Multiple vulnerabilities have been found in Asterisk, the worst of
19 which may allow execution of arbitrary code.
20
21 Background
22 ==========
23
24 Asterisk is an open source telephony engine and toolkit.
25
26 Affected packages
27 =================
28
29 -------------------------------------------------------------------
30 Package / Vulnerable / Unaffected
31 -------------------------------------------------------------------
32 1 net-misc/asterisk < 1.8.15.1 >= 1.8.15.1
33
34 Description
35 ===========
36
37 Multiple vulnerabilities have been found in Asterisk:
38
39 * An error in manager.c allows shell access (CVE-2012-2186).
40 * An error in Asterisk could cause all RTP ports to be exhausted
41 (CVE-2012-3812).
42 * A double-free error could occur when two parties attempt to
43 manipulate the same voicemail account simultaneously (CVE-2012-3863).
44 * Asterisk does not properly implement certain ACL rules
45 (CVE-2012-4737).
46
47 Impact
48 ======
49
50 A remote, authenticated attacker could execute arbitrary code with the
51 privileges of the process, cause a Denial of Service condition, or
52 bypass outbound call restrictions.
53
54 Workaround
55 ==========
56
57 There is no known workaround at this time.
58
59 Resolution
60 ==========
61
62 All Asterisk users should upgrade to the latest version:
63
64 # emerge --sync
65 # emerge --ask --oneshot --verbose ">=net-misc/asterisk-1.8.15.1"
66
67 References
68 ==========
69
70 [ 1 ] CVE-2012-2186
71 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2186
72 [ 2 ] CVE-2012-3812
73 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3812
74 [ 3 ] CVE-2012-3863
75 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3863
76 [ 4 ] CVE-2012-4737
77 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4737
78
79 Availability
80 ============
81
82 This GLSA and any updates to it are available for viewing at
83 the Gentoo Security Website:
84
85 http://security.gentoo.org/glsa/glsa-201209-15.xml
86
87 Concerns?
88 =========
89
90 Security is a primary focus of Gentoo Linux and ensuring the
91 confidentiality and security of our users' machines is of utmost
92 importance to us. Any security concerns should be addressed to
93 security@g.o or alternatively, you may file a bug at
94 https://bugs.gentoo.org.
95
96 License
97 =======
98
99 Copyright 2012 Gentoo Foundation, Inc; referenced text
100 belongs to its owner(s).
101
102 The contents of this document are licensed under the
103 Creative Commons - Attribution / Share Alike license.
104
105 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature