Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 175960 - net-misc/asterisk - Remote Crash Vulnerability in Manager Interface
Summary: net-misc/asterisk - Remote Crash Vulnerability in Manager Interface
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL:
Whiteboard: C3 [ebuild] jaervosz
Keywords:
Depends on:
Blocks:
 
Reported: 2007-04-25 12:21 UTC by Carsten Lohrke (RETIRED)
Modified: 2007-05-06 23:09 UTC (History)
4 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Carsten Lohrke (RETIRED) gentoo-dev 2007-04-25 12:21:57 UTC
ASA-2007-010: Two stack buffer overflows in SIP channel's T.38 SDP parsing code
http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053969.html

ASA-2007-011: Multiple problems in SIP channel parser handling response codes
http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053967.html

ASA-2007-012: Remote Crash Vulnerability in Manager Interface
http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053968.html
Comment 1 Gustavo Zacarias (RETIRED) gentoo-dev 2007-04-25 12:24:03 UTC
ASA-2007-010 doesn't apply since we don't have 1.4.x in portage and previous versions aren't affected.
Comment 2 Rajiv Aaron Manglani (RETIRED) gentoo-dev 2007-04-25 13:25:55 UTC
ASA-2007-011 was fixed in gentoo bug 171467.
Comment 3 Gustavo Zacarias (RETIRED) gentoo-dev 2007-04-30 12:36:46 UTC
asterisk-1.2.17 contains fixes for ASA-2007-011 and ASA-2007-012.
it does not contain fixes for ael (bug #171884) however - even asterisk 1.2.18 lacks fixes for this.
Comment 4 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-04-30 13:17:18 UTC
Arches please test and mark stable. Target keywords are:

asterisk-1.2.17.ebuild:KEYWORDS="~alpha ~amd64 ~hppa ~ppc sparc x86"
Comment 5 Gustavo Zacarias (RETIRED) gentoo-dev 2007-04-30 19:16:57 UTC
sparc stable.
Comment 6 Raúl Porcel (RETIRED) gentoo-dev 2007-05-01 09:18:38 UTC
x86 stable
Comment 7 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-05-01 12:11:18 UTC
This one is ready for GLSA decision. I vote YES.
Comment 8 Daniel Black (RETIRED) gentoo-dev 2007-05-02 11:21:52 UTC
I'm voting no.
marginal software - specific configuration (C3) and a specific action to cause a DoS.
Comment 9 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-05-02 12:17:51 UTC
I fail to see the specific configuration for ASA-2007-011, am I just overlooking something?
Comment 10 Matt Drew (RETIRED) gentoo-dev 2007-05-02 12:22:15 UTC
I vote yes - it may be marginal, but for people who are using it, this is very critical software (911 calls, etc), and the SIP DoS could be a huge problem.
Comment 11 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-05-02 12:36:00 UTC
2 YES votes and 1 NO vote. Lets have a GLSA.

voip we forgot 1.x, should that be bumped or will the comment on GLSA 200704-01 suffice?
Comment 12 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-05-02 12:38:56 UTC
Seems like aetius and I overlooked comment #2.

Agreeing with Daniel then and reverting to a full NO and closing. Feel free to reopen if you disagree.
Comment 13 Rajiv Aaron Manglani (RETIRED) gentoo-dev 2007-05-02 20:21:54 UTC
asterisk 1.0.12 (and our -r2) is vulnerable to ASA-2007-012 but the risk is minimal. the manager interface is typically not exposed outside trusted networks, and not enabled by default.

i will patch in our cvs. no glsa required.
Comment 14 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-05-03 18:22:27 UTC
Rajiv please comment here once it is done and I will call arches.
Comment 15 Rajiv Aaron Manglani (RETIRED) gentoo-dev 2007-05-06 23:09:54 UTC
asterisk 1.0.12 is now package masked and will not be patched. closing.