Summary: | <net-misc/asterisk-{1.8.19.1,10.11.1,11.1.1}: Two DoS vulnerabilities (CVE-2012-{5976,5977}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Sean Amoss (RETIRED) <ackle> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | chainsaw, voip+disabled |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.asterisk.org/downloads/security-advisories | ||
Whiteboard: | B3 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Sean Amoss (RETIRED)
![]() ![]() +*asterisk-11.1.1 (02 Jan 2013) +*asterisk-10.11.1 (02 Jan 2013) +*asterisk-1.8.19.1 (02 Jan 2013) + + 02 Jan 2013; Tony Vroon <chainsaw@gentoo.org> -asterisk-1.8.15.1.ebuild, + -asterisk-1.8.18.1.ebuild, -asterisk-1.8.19.0.ebuild, + +asterisk-1.8.19.1.ebuild, -asterisk-10.10.1.ebuild, + -asterisk-10.11.0.ebuild, +asterisk-10.11.1.ebuild, -asterisk-11.0.2.ebuild, + -asterisk-11.1.0.ebuild, +asterisk-11.1.1.ebuild: + Security releases on all three branches; stop using stack allocations in TCP + receive paths, as multiple packets may be concatenated together and overflow + the stack as a result (CVE-2012-5976 / AST-2012-015). Never cache devices + that are not associated with a physical entity, as to do so allows a denial + of service through cache exhaustion (CVE-2012-5977 / AST-2012-014). Remove + all non-stable vulnerable ebuilds. As requested by Sean Amoss in bug #449828. Arches, please test & mark stable =net-misc/asterisk-1.8.19.1 Target keywords: amd64 x86 Please compile on different USE-flag permutations and confirm that the daemon is able to survive at least three start/stop cycles. x86 done. amd64 stable Thanks, everyone. GLSA vote: yes. + 03 Jan 2013; Tony Vroon <chainsaw@gentoo.org> -asterisk-1.8.18.0-r2.ebuild: + Clear vulnerable ebuild in 1.8 branch now that stabling has completed. GLSA Vote: yes, too. GLSA request filed. CVE-2012-5977 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5977): Asterisk Open Source 1.8.x before 1.8.19.1, 10.x before 10.11.1, and 11.x before 11.1.2; Certified Asterisk 1.8.11 before 1.8.11-cert10; and Asterisk Digiumphones 10.x-digiumphones before 10.11.1-digiumphones, when anonymous calls are enabled, allow remote attackers to cause a denial of service (resource consumption) by making anonymous calls from multiple sources and consequently adding many entries to the device state cache. CVE-2012-5976 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5976): Multiple stack consumption vulnerabilities in Asterisk Open Source 1.8.x before 1.8.19.1, 10.x before 10.11.1, and 11.x before 11.1.2; Certified Asterisk 1.8.11 before 1.8.11-cert10; and Asterisk Digiumphones 10.x-digiumphones before 10.11.1-digiumphones allow remote attackers to cause a denial of service (daemon crash) via TCP data using the (1) SIP, (2) HTTP, or (3) XMPP protocol. This issue was resolved and addressed in GLSA 201401-15 at http://security.gentoo.org/glsa/glsa-201401-15.xml by GLSA coordinator Sergey Popov (pinkbyte). |