Summary: | <net-misc/asterisk-11.12.1: Remote crash when handling out of call message in certain dialplan configurations [AST-2014-010] (CVE-2014-6610) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | ||
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1144319 | ||
Whiteboard: | B3 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
![]() Arches, please test & mark stable: =net-misc/asterisk-11.12.1 Target keywords: amd64 x86 The Asterisk 12 branch is masked and vulnerable ebuilds have been removed there. amd64 stable x86 stable. Maintainer(s), please cleanup. Security, please vote. GLSA Vote: Yes + 22 Sep 2014; Tony Vroon <chainsaw@gentoo.org> -asterisk-11.10.2.ebuild: + Remove vulnerable ebuild for security bug #523216 as stabilisation is + complete. 1.8 branch not affected. Maintainer(s), Thank you for cleanup! GLSA Vote: Yes Created a New GLSA request. This issue was resolved and addressed in GLSA 201411-10 at http://security.gentoo.org/glsa/glsa-201411-10.xml by GLSA coordinator Sean Amoss (ackle). CVE-2014-6610 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6610): Asterisk Open Source 11.x before 11.12.1 and 12.x before 12.5.1 and Certified Asterisk 11.6 before 11.6-cert6, when using the res_fax_spandsp module, allows remote authenticated users to cause a denial of service (crash) via an out of call message, which is not properly handled in the ReceiveFax dialplan application. |