Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2011.0672.2 A number of vulnerabilities have been identified in Asterisk 7 July 2011 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Asterisk Publisher: Asterisk Operating System: UNIX variants (UNIX, Linux, OSX) Impact/Access: Denial of Service -- Remote/Unauthenticated Unauthorised Access -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2011-2665 CVE-2011-2535 CVE-2011-2529 Original Bulletin: http://downloads.asterisk.org/pub/security/AST-2011-008.html http://downloads.asterisk.org/pub/security/AST-2011-009.html http://downloads.asterisk.org/pub/security/AST-2011-010.html Comment: This bulletin contains three (3) Asterisk security advisories. Revision History: July 7 2011: Added CVE reference June 27 2011: Initial Release - --------------------------BEGIN INCLUDED TEXT-------------------- Product Asterisk Summary Remote Crash Vulnerability in SIP channel driver Nature of Advisory Remote attacker can crash an Asterisk server Susceptibility Remote Unauthenticated Sessions Severity Critical Exploits Known Yes Reported On 06/15/2011 Reported By Paul Belanger pabelanger@digium.com Posted On 06/20/2011 Last Updated On June 16, 2011 Advisory Contact Kinsey Moore kmoore@digium.com CVE Name CVE-2011-2529 Description If a remote user sends a SIP packet containing a null, Asterisk assumes available data extends past the null to the end of the packet when the buffer is actually truncated when copied. This causes SIP header parsing to modify data past the end of the buffer altering unrelated memory structures. This vulnerability does not affect TCP/TLS connections. Resolution Asterisk now uses the correct length when dealing with SIP packets containing nulls. Available workarounds are to disable chan_sip or to upgrade. Affected Versions Product Release Series Asterisk Open Source 1.6.0.x All Asterisk Open Source 1.6.1.x All Asterisk Open Source 1.6.2.x All Asterisk Open Source 1.8.x All Corrected In Product Release Asterisk Open Source 1.6.2.x 1.6.2.18.1 Asterisk Open Source 1.8.x 1.8.4.3 Patches URL Branch Http://downloads.asterisk.org/pub/security/AST-2011-008.diff 1.6.2, 1.8 Asterisk Project Security Advisories are posted at http://www.asterisk.org/security This document may be superseded by later versions; if so, the latest version will be posted at http://downloads.digium.com/pub/security/AST-2011-008.pdf and http://downloads.digium.com/pub/security/AST-2011-008.html Revision History Date Editor Revisions Made 06/20/2011 Kinsey Moore Initial Release - ------------------------------------------------------------------------------- Product Asterisk Summary Remote Crash Vulnerability in SIP channel driver Nature of Advisory Remote attacker can crash an Asterisk server Susceptibility Remote Unauthenticated Sessions Severity Critical Exploits Known Yes Reported On 06/13/2011 Reported By jaredmauch Posted On 06/23/2011 Last Updated On June 23, 2011 Advisory Contact Paul Belanger pabelanger@digium.com CVE Name CVE Requested Description A remote user sending a SIP packet containing a Contact header with a missing left angle bracket (<) causes Asterisk to access a null pointer. Resolution Asterisk now warns the user of the missing bracket and continues processing. Available workarounds are to disable chan_sip or to upgrade. Affected Versions Product Release Series Asterisk Open Source 1.8.x All Corrected In Product Release Asterisk Open Source 1.8.x 1.8.4.3 Patches SVN URL Revision Http://downloads.asterisk.org/pub/security/AST-2011-009.diff 1.8 Asterisk Project Security Advisories are posted at http://www.asterisk.org/security This document may be superseded by later versions; if so, the latest version will be posted at http://downloads.digium.com/pub/security/AST-2011-009.pdf and http://downloads.digium.com/pub/security/AST-2011-009.html Revision History Date Editor Revisions Made 06/20/2011 Kinsey Moore Initial Release - ------------------------------------------------------------------------------- Asterisk Project Security Advisory - AST-2011-010 Product Asterisk Summary Remote crash vulnerability in IAX2 channel driver Nature of Advisory Remote crash Susceptibility Remote unauthenticated sessions Severity Moderate Exploits Known No Reported On June 1, 2011 Reported By Posted On June 22, 2011 Last Updated On June 22, 2011 Advisory Contact Terry Wilson <twilson@digium.com> CVE Name CVE-2011-2535 Description A memory address was inadvertently transmitted over the network via IAX2 via an option control frame and the remote party would try to access it. Resolution The default behavior is to no longer transmit all option control frame data across an IAX2 link, but only what is specifically useful to send. The option that was passed is also no longer read via the network if it is sent. Affected Versions Product Release Series Asterisk Open Source 1.4.x 1.4.37+ Asterisk Open Source 1.6.2.x 1.6.2.15+ Asterisk Open Source 1.8.x All versions Asterisk Business Edition C.3 C.3.6+ Corrected In Product Release Asterisk Open Source 1.4.41.1, 1.6.2.18.1, 1.8.4.3 Asterisk Business Edition C.3.7.3 Patches SVN URL Revision http://downloads.asterisk.org/pub/security/AST-2011-010-1.4.diff 1.4 http://downloads.asterisk.org/pub/security/AST-2011-010-1.6.2.diff 1.6.2 http://downloads.asterisk.org/pub/security/AST-2011-010-1.8.diff 1.8 Links Asterisk Project Security Advisories are posted at http://www.asterisk.org/security This document may be superseded by later versions; if so, the latest version will be posted at http://downloads.digium.com/pub/security/AST-2011-010.pdf and http://downloads.digium.com/pub/security/AST-2011-010.html Revision History Date Editor Revisions Made Asterisk Project Security Advisory - AST-2011-010 Copyright 2011 Digium, Inc. All Rights Reserved. Permission is hereby granted to distribute and publish this advisory in its original, unaltered form. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBThUzpu4yVqjM2NGpAQL2sg/+O4x9HY9tNiTlMRZjRUKxu5qmNdEOcTeF pPCbyD8iA/4I1Soo5nj5ewUfx8pAwGtPMUlXSK8Vvnw70gG2nJO/tX7d9ydIz3Zk V7sJebYJU9V9GyQY3UMSbP+miuW6rgT52phGWQ/Rx4Jz2/FsvVH5NxPaCI1YU+EG YfmmTBgR+QGyYvAUWKscTWeOGVSyG7xettCy9K+c195AW4pChg11l8ztoFKvX2gU gM73/mEoETb70czTkXIohMT6K2Vj+QGWjx2P28vfbawRJxNQc515FDQ2HN5D6ubw +8rvQ6BkvI2IHvOj9Ynr1O90kpmDM3rbQH18p3pCjytExrLv9AF1pCDuLdVXy6bb IqAw4vpfas43+KpxHMLfiBDnjuZj/PDUwQ0NOeAD4uoU9sPTvM+gjL4FQybS3qnE aYrsEbfpo0Ua+NpMZf/n9E5oB1mkY399NuMV0z6qjvyR0AWr5gxrcm0wuR6dXQDI jZT26aCyR46Z4uOBSGUS+OVM6fynFhgmCAJHirJKsXk9dWS+XFvLrsnlvNSg+jBF +ZL0ojxL4H3fBgP8THPWFkjbv33+CSpauclZKafi55t35ZA2SBZtaGGyCQhEaMaH YKg+y956zm3+gtEXPNKpbNrbf6moYV0RRjlYn0q4HqMuqTTDjF/DTuJSrUlGRjgH zD5fH8SWXBI= =N1gx -----END PGP SIGNATURE-----