Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 614738 (CVE-2017-7617)

Summary: net-misc/asterisk: Buffer overflow in CDR's set user
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: trivial CC: alexanderyt, chainsaw
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://bugzilla.redhat.com/show_bug.cgi?id=1439099
Whiteboard: ~2 [noglsa cve]
Package list:
Runtime testing required: ---

Description Agostino Sarubbo gentoo-dev 2017-04-05 10:29:49 UTC
From ${URL} :

No size checking is done when setting the user field on a CDR. Thus, it is possible for someone to use an arbitrarily large string and write past the end of the user field storage buffer. This allows 
the possibility of remote code injection.

External References:

http://downloads.asterisk.org/pub/security/AST-2017-001.html

Upstream patches:

[Asterisk 13] http://downloads.asterisk.org/pub/security/AST-2017-001-13.diff
[Asterisk 14] http://downloads.asterisk.org/pub/security/AST-2017-001-14.diff

Upstream bug:

https://issues.asterisk.org/jira/browse/ASTERISK-26897


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Thomas Deutschmann (RETIRED) gentoo-dev 2017-06-04 21:41:24 UTC
Doesn't affect our stable version (11.25.1).

I bumped to masked v13.x release (https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=ddf1da777ba1363c0c0aea3729a9a519d7da2ddc).

All done, repository is clean.