[asterisk-announce] Asterisk 1.2.28, 188.8.131.52, and 1.6.0-beta8 Released
The Asterisk Development Team asteriskteam at digium.com
Tue Apr 22 18:05:07 CDT 2008
The Asterisk development team has released versions 1.2.28, 184.108.40.206, and
All of these releases contain a security patch for the vulnerability described
in the AST-2008-006 security advisory. 1.6.0-beta8 is also a regular update to
the 1.6.0 series with a number of bug fixes over the previous beta release.
Early last year, we made some modifications to the IAX2 channel driver to combat
potential usage of IAX2 in traffic amplification attacks. Unfortunately, our
fix was not complete and we were not notified of this until the original
reporter of the issue decided to release information on how to exploit it to the
This issue affects all users of IAX2 that have allowed non-authenticated calls.
For more information on the vulnerability, see the published security advisory.
All releases are available for download from the following location:
Thank you for your continued support of Asterisk!
Javantea originally reported an issue in IAX2, whereby an attacker could send a spoofed IAX2 NEW message, and Asterisk would start sending early audio to the target address, without ever receiving an initial response. That original vulnerability was addressed in June 2007, by requiring a response to the initial NEW message before starting to send any audio.
Javantea subsequently found that we were doing insufficent verification of the ACK response and that the ACK response could be spoofed, just like the initial NEW message. We have addressed this failure with two changes. First, we have started to require that the ACK response contains the unique source call number that we send in our reply to the NEW message. Any ACK response that does not contain the source call number that we have created will be silently thrown away. Second, we have made the generation of our source call number a little more difficult to predict, by randomly selecting a source call number, instead of allocating them sequentially.
fixed in voip overlay for versions 220.127.116.11 and 1.6.0-beta8.
CVE-2008-1923 was assigned to the original "NEW" issue in June 2007.
(In reply to comment #2)
> CVE-2008-1923 was assigned to the original "NEW" issue in June 2007.
This was released with 1.2.20.
voip, any news here?
This is only first security bug report from 7 others opened.
Somebody has either mask asterisk stable packages in the portage or fix them all.
The way how it is now doesn't make sense for me.
+*asterisk-18.104.22.168 (11 Mar 2009)
+ 11 Mar 2009; <email@example.com>
+ +files/1.2.0/asterisk-22.214.171.124-svn89254.diff, +asterisk-126.96.36.199.ebuild:
+ Version bump, for security bugs #250748 and #254304. Took a 1.4 build fix
+ that is relevant to 1.2, Digium bug #11238. Wrote patch to fix up typo in
+ open call, a comma is not a pipe sign. Used EAPI 2 for USE-based
+ dependencies instead of calling die. Patch from Mounir Lamouri adding
+ -lspeexdsp closes bug #206463 filed by John Read.
Stabling via bug 250748