Summary: | <net-misc/asterisk-1.8.13.1 : Two Denial of Service Vulnerabilities (CVE-2012-{3812,3863}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | chainsaw, voip+disabled |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://secunia.com/advisories/49814/ | ||
Whiteboard: | B3 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2012-07-06 12:32:21 UTC
+*asterisk-10.5.2 (06 Jul 2012) +*asterisk-1.8.13.1 (06 Jul 2012) + + 06 Jul 2012; Tony Vroon <chainsaw@gentoo.org> -asterisk-1.8.13.0.ebuild, + -asterisk-1.8.13.0-r1.ebuild, +asterisk-1.8.13.1.ebuild, + -asterisk-10.5.1.ebuild, +asterisk-10.5.2.ebuild: + Upgrades on the 1.8 & 10 branches to address a potential resource leak when a + re-invite transaction is not completed (AST-2012-010) and on the 1.8 branch + only for a remote crash vulnerability in the voicemail application + (AST-2012-011). Both covered under CVE-2012-3812. Removed any non-stable + vulnerable ebuild. Arches, please test and mark stable: =net-misc/asterisk-1.8.13.1 Last arch, please remove: =net-misc/asterisk-1.8.12.1 amd64 stable x86 stable Thanks, everyone. GLSA vote: yes. CVE-2012-3812 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3812): Double free vulnerability in apps/app_voicemail.c in Asterisk Open Source 1.8.x before 1.8.13.1 and 10.x before 10.5.2, Certified Asterisk 1.8.11-certx before 1.8.11-cert4, and Asterisk Digiumphones 10.x.x-digiumphones before 10.5.2-digiumphones allows remote authenticated users to cause a denial of service (daemon crash) by establishing multiple voicemail sessions and accessing both the Urgent mailbox and the INBOX mailbox. CVE-2012-3863 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3863): channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.13.1 and 10.x before 10.5.2, Asterisk Business Edition C.3.x before C.3.7.5, Certified Asterisk 1.8.11-certx before 1.8.11-cert4, and Asterisk Digiumphones 10.x.x-digiumphones before 10.5.2-digiumphones does not properly handle a provisional response to a SIP reINVITE request, which allows remote authenticated users to cause a denial of service (RTP port exhaustion) via sessions that lack final responses. Thanks, folks. GLSA Vote: yes too. Request filed. This issue was resolved and addressed in GLSA 201209-15 at http://security.gentoo.org/glsa/glsa-201209-15.xml by GLSA coordinator Sean Amoss (ackle). |