Summary: | <net-misc/asterisk-{1.2.37, 1.6.1.11} SIP RTP DoS (CVE-2009-4055) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Rajiv Aaron Manglani (RETIRED) <rajiv> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | voip+disabled |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://lists.digium.com/pipermail/asterisk-announce/2009-November/000214.html | ||
Whiteboard: | B3 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Rajiv Aaron Manglani (RETIRED)
![]() +*asterisk-1.6.1.11 (01 Dec 2009) + + 01 Dec 2009; <chainsaw@gentoo.org> -asterisk-1.6.1.9.ebuild, + -asterisk-1.6.1.10.ebuild, +asterisk-1.6.1.11.ebuild: + Version bump as requested by Rajiv Aaron Manglani <rajiv@gentoo.org> in + security bug #295270. Fixes a remote crash caused by a comfort noise + payload over 24 bytes in length. Also contains an SDP regression fix, + upstream bug reports #16368 & #16238. Vulnerable 1.6 branch ebuilds + killed. +*asterisk-1.2.37 (01 Dec 2009) + + 01 Dec 2009; <chainsaw@gentoo.org> asterisk-1.2.35.ebuild, + +asterisk-1.2.37.ebuild: + Version bump as requested by Rajiv Aaron Manglani <rajiv@gentoo.org> in + security bug #295270. Fixes a remote crash caused by a comfort noise + payload over 24 bytes in length. Reduce 1.2.35 keywords to PPC, unable to + delete at this time. Arches, please test & mark stable net-misc/asterisk-1.2.37 Target keywords: alpha amd64 ~hppa ppc sparc x86 PowerPC, please delete 1.2.35 once you have keyworded 1.2.37, skipping 1.2.36. You can then un-CC yourself from security bug #284892. Arch teams, for testing please use the default configuration supplied and confirm that the init script will start & stop the daemon. x86 stable amd64 stable CVE-2009-4055 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4055): rtp.c in Asterisk Open Source 1.2.x before 1.2.37, 1.4.x before 1.4.27.1, 1.6.0.x before 1.6.0.19, and 1.6.1.x before 1.6.1.11; Business Edition B.x.x before B.2.5.13, C.2.x.x before C.2.4.6, and C.3.x.x before C.3.2.3; and s800i 1.3.x before 1.3.0.6 allows remote attackers to cause a denial of service (daemon crash) via an RTP comfort noise payload with a long data length. alpha/sparc stable Marked ppc stable, removed 1.2.35 as directed. voip: Please remove vulnerable ebuilds (1.2.36 at least). Rerating for DoS. + 31 May 2010; <chainsaw@gentoo.org> -asterisk-1.2.36.ebuild: + Remove vulnerable version as per Alex "a3li" Legler in security bug + #295270. GLSA 201006-20 |