Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 224949 (CVE-2008-2543) - net-misc/asterisk-addons < 1.2.9 Remote crash vulnerability in ooh323 channel (CVE-2008-2543)
Summary: net-misc/asterisk-addons < 1.2.9 Remote crash vulnerability in ooh323 channel...
Status: RESOLVED FIXED
Alias: CVE-2008-2543
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor
Assignee: Gentoo Security
URL: http://lists.digium.com/pipermail/ast...
Whiteboard: ~3 [noglsa]
Keywords:
Depends on: 267366
Blocks:
  Show dependency tree
 
Reported: 2008-06-05 04:55 UTC by Rajiv Aaron Manglani (RETIRED)
Modified: 2009-05-01 15:59 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Rajiv Aaron Manglani (RETIRED) gentoo-dev 2008-06-05 04:55:11 UTC
Asterisk Project Security Advisory - AST-2008-009

  +------------------------------------------------------------------------+
  |      Product       | Asterisk-Addons                                   |
  |--------------------+---------------------------------------------------|
  |      Summary       | Remote crash vulnerability in ooh323 channel      |
  |                    | driver                                            |
  |--------------------+---------------------------------------------------|
  | Nature of Advisory | Remote crash                                      |
  |--------------------+---------------------------------------------------|
  |   Susceptibility   | Remote unauthenticated sessions                   |
  |--------------------+---------------------------------------------------|
  |      Severity      | Major                                             |
  |--------------------+---------------------------------------------------|
  |   Exploits Known   | No                                                |
  |--------------------+---------------------------------------------------|
  |    Reported On     | May 29, 2008                                      |
  |--------------------+---------------------------------------------------|
  |    Reported By     | Tzafrir Cohen <tzafrir DOT cohen AT xorcom DOT    |
  |                    | com>                                              |
  |--------------------+---------------------------------------------------|
  |     Posted On      | June 4, 2008                                      |
  |--------------------+---------------------------------------------------|
  |  Last Updated On   | June 4, 2008                                      |
  |--------------------+---------------------------------------------------|
  |  Advisory Contact  | Mark Michelson <mmichelson AT digium DOT com>     |
  |--------------------+---------------------------------------------------|
  |      CVE Name      | CVE-2008-2543                                     |
  +------------------------------------------------------------------------+

  +------------------------------------------------------------------------+
  | Description | The ooh323 channel driver provided in Asterisk Addons    |
  |             | used a TCP connection to pass commands internally. The   |
  |             | payload of these packets included addresses of memory    |
  |             | which were to be freed after the command was processed.  |
  |             | By sending arbitrary data to the listening TCP socket,   |
  |             | one could cause an almost certain crash since the        |
  |             | command handler would attempt to free invalid memory.    |
  |             | This problem was made worse by the fact that the         |
  |             | listening TCP socket was bound to whatever IP address    |
  |             | was specified by the "bindaddr" option in ooh323.conf    |
  +------------------------------------------------------------------------+

  +------------------------------------------------------------------------+
  | Resolution | The TCP connection used by ooh323 has been replaced with  |
  |            | a pipe. The effect of this change is that data from       |
  |            | outside the ooh323 process may not be injected.           |
  +------------------------------------------------------------------------+

  +------------------------------------------------------------------------+
  |                           Affected Versions                            |
  |------------------------------------------------------------------------|
  |             Product              |   Release   |                       |
  |                                  |   Series    |                       |
  |----------------------------------+-------------+-----------------------|
  |       Asterisk Open Source       |    1.0.x    | N/A                   |
  |----------------------------------+-------------+-----------------------|
  |       Asterisk Open Source       |    1.2.x    | N/A                   |
  |----------------------------------+-------------+-----------------------|
  |       Asterisk Open Source       |    1.4.x    | N/A                   |
  |----------------------------------+-------------+-----------------------|
  |         Asterisk Addons          |    1.2.x    | All versions prior to |
  |                                  |             | 1.2.9                 |
  |----------------------------------+-------------+-----------------------|
  |         Asterisk Addons          |    1.4.x    | All versions prior to |
  |                                  |             | 1.4.7                 |
  |----------------------------------+-------------+-----------------------|
  |    Asterisk Business Edition     |    A.x.x    | N/A                   |
  |----------------------------------+-------------+-----------------------|
  |    Asterisk Business Edition     |    B.x.x    | N/A                   |
  |----------------------------------+-------------+-----------------------|
  |    Asterisk Business Edition     |    C.x.x    | N/A                   |
  |----------------------------------+-------------+-----------------------|
  |           AsteriskNOW            | pre-release | N/A                   |
  |----------------------------------+-------------+-----------------------|
  | Asterisk Appliance Developer Kit |    0.x.x    | N/A                   |
  |----------------------------------+-------------+-----------------------|
  |    s800i (Asterisk Appliance)    |    1.0.x    | N/A                   |
  +------------------------------------------------------------------------+

  +------------------------------------------------------------------------+
  |                              Corrected In                              |
  |------------------------------------------------------------------------|
  |                 Product                  |           Release           |
  |------------------------------------------+-----------------------------|
  |           Asterisk Addons 1.2            |            1.2.9            |
  |------------------------------------------+-----------------------------|
  |           Asterisk-Addons 1.4            |            1.4.7            |
  |------------------------------------------+-----------------------------|
  +------------------------------------------------------------------------+

  +------------------------------------------------------------------------+
  |        Links        |                                                  |
  +------------------------------------------------------------------------+

  +------------------------------------------------------------------------+
  | Asterisk Project Security Advisories are posted at                     |
  | http://www.asterisk.org/security                                       |
  |                                                                        |
  | This document may be superseded by later versions; if so, the latest   |
  | version will be posted at                                              |
  | http://downloads.digium.com/pub/security/AST-2008-009.pdf and          |
  | http://downloads.digium.com/pub/security/AST-2008-009.html             |
  +------------------------------------------------------------------------+

  +------------------------------------------------------------------------+
  |                            Revision History                            |
  |------------------------------------------------------------------------|
  |       Date        |        Editor        |       Revisions Made        |
  |-------------------+----------------------+-----------------------------|
  | Jun 3, 2008       | Mark Michelson       | Initial draft               |
  +------------------------------------------------------------------------+

              Asterisk Project Security Advisory - AST-2008-009
             Copyright (c) 2008 Digium, Inc. All Rights Reserved.
 Permission is hereby granted to distribute and publish this advisory in its
                          original, unaltered form.
Comment 1 Rambaldi 2008-06-07 10:12:47 UTC
fixed in voip overlay in version asterisk-addons-1.4.7 and asterisk-addons-1.6.0_beta4
Comment 2 Robert Buchholz (RETIRED) gentoo-dev 2008-06-08 22:48:57 UTC
When will we see those in the tree?
Comment 3 Pierre-Yves Rofes (RETIRED) gentoo-dev 2008-07-13 19:40:57 UTC
(In reply to comment #2)
> When will we see those in the tree?
> 

*ping*
Comment 4 Alex Legler (RETIRED) archtester gentoo-dev Security 2009-03-09 17:20:26 UTC
Rerating to ~3 as there has been no stable version.
Pinged the voip herd on IRC, they're working on it and also are recruiting a new dev to speed things up.
Comment 5 Mounir Lamouri (volkmar) (RETIRED) gentoo-dev 2009-04-24 19:41:49 UTC
bug 267366 has been opened to add asterisk-addons-1.6* to the tree.
Comment 6 Tony Vroon (RETIRED) gentoo-dev 2009-05-01 15:44:22 UTC
+*asterisk-addons-1.2.9 (01 May 2009)
+
+  01 May 2009; <chainsaw@gentoo.org> -asterisk-addons-1.2.8.ebuild,
+  +asterisk-addons-1.2.9.ebuild, metadata.xml:
+  Version bump for security bug #224949, with apologies for the delay. Took
+  maintainership. Corrected Asterisk dependency, this will not work against
+  1.6 or 1.4 at all. Removed vulnerable version.
Comment 7 Alex Legler (RETIRED) archtester gentoo-dev Security 2009-05-01 15:59:08 UTC
~arch -> noglsa. Thanks!