Gentoo Archives: gentoo-commits

From: "Pierre-Yves Rofes (py)" <py@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] gentoo commit in xml/htdocs/security/en/glsa: glsa-200802-11.xml
Date: Tue, 26 Feb 2008 22:23:54
Message-Id: E1JU8DH-0004td-KX@stork.gentoo.org
1 py 08/02/26 22:23:51
2
3 Added: glsa-200802-11.xml
4 Log:
5 GLSA 200802-11
6
7 Revision Changes Path
8 1.1 xml/htdocs/security/en/glsa/glsa-200802-11.xml
9
10 file : http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/security/en/glsa/glsa-200802-11.xml?rev=1.1&view=markup
11 plain: http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/security/en/glsa/glsa-200802-11.xml?rev=1.1&content-type=text/plain
12
13 Index: glsa-200802-11.xml
14 ===================================================================
15 <?xml version="1.0" encoding="utf-8"?>
16 <?xml-stylesheet href="/xsl/glsa.xsl" type="text/xsl"?>
17 <?xml-stylesheet href="/xsl/guide.xsl" type="text/xsl"?>
18 <!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
19
20 <glsa id="200802-11">
21 <title>Asterisk: Multiple vulnerabilities</title>
22 <synopsis>
23 Multiple vulnerabilities have been found in Asterisk.
24 </synopsis>
25 <product type="ebuild">asterisk</product>
26 <announced>February 26, 2008</announced>
27 <revised>February 26, 2008: 01</revised>
28 <bug>185713</bug>
29 <access>remote</access>
30 <affected>
31 <package name="net-misc/asterisk" auto="yes" arch="*">
32 <unaffected range="rge">1.2.17-r1</unaffected>
33 <unaffected range="ge">1.2.21.1-r1</unaffected>
34 <vulnerable range="lt">1.2.21.1-r1</vulnerable>
35 </package>
36 </affected>
37 <background>
38 <p>
39 Asterisk is an open source telephony engine and tool kit.
40 </p>
41 </background>
42 <description>
43 <p>
44 Multiple vulnerabilities have been found in Asterisk:
45 </p>
46 <ul>
47 <li>Russel Bryant reported a stack buffer overflow in the IAX2 channel
48 driver (chan_iax2) when bridging calls between chan_iax2 and any
49 channel driver that uses RTP for media (CVE-2007-3762).</li>
50 <li>Chris
51 Clark and Zane Lackey (iSEC Partners) reported a NULL pointer
52 dereference in the IAX2 channel driver (chan_iax2)
53 (CVE-2007-3763).</li>
54 <li>Will Drewry (Google Security) reported a
55 vulnerability in the Skinny channel driver (chan_skinny), resulting in
56 an overly large memcpy (CVE-2007-3764).</li>
57 <li>Will Drewry (Google
58 Security) reported a vulnerability in the IAX2 channel driver
59 (chan_iax2), that does not correctly handle unauthenticated
60 transactions using a 3-way handshake (CVE-2007-4103).</li>
61 </ul>
62 </description>
63 <impact type="high">
64 <p>
65 By sending a long voice or video RTP frame, a remote attacker could
66 possibly execute arbitrary code on the target machine. Sending
67 specially crafted LAGRQ or LAGRP frames containing information elements
68 of IAX frames, or a certain data length value in a crafted packet, or
69 performing a flood of calls not completing a 3-way handshake, could
70 result in a Denial of Service.
71 </p>
72 </impact>
73 <workaround>
74 <p>
75 There is no known workaround at this time.
76 </p>
77 </workaround>
78 <resolution>
79 <p>
80 All Asterisk users should upgrade to the latest version:
81 </p>
82 <code>
83 # emerge --sync
84 # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/asterisk-1.2.17-r1&quot;</code>
85 </resolution>
86 <references>
87 <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3762">CVE-2007-3762</uri>
88 <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3763">CVE-2007-3763</uri>
89 <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3764">CVE-2007-3764</uri>
90 <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4103">CVE-2007-4103</uri>
91 </references>
92 <metadata tag="requester" timestamp="Wed, 07 Nov 2007 19:55:16 +0000">
93 jaervosz
94 </metadata>
95 <metadata tag="submitter" timestamp="Thu, 22 Nov 2007 23:26:53 +0000">
96 keytoaster
97 </metadata>
98 <metadata tag="bugReady" timestamp="Tue, 26 Feb 2008 19:44:52 +0000">
99 jaervosz
100 </metadata>
101 </glsa>
102
103
104
105 --
106 gentoo-commits@l.g.o mailing list