Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 614738 (CVE-2017-7617) - net-misc/asterisk: Buffer overflow in CDR's set user
Summary: net-misc/asterisk: Buffer overflow in CDR's set user
Status: RESOLVED FIXED
Alias: CVE-2017-7617
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: ~2 [noglsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2017-04-05 10:29 UTC by Agostino Sarubbo
Modified: 2017-06-04 21:41 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2017-04-05 10:29:49 UTC
From ${URL} :

No size checking is done when setting the user field on a CDR. Thus, it is possible for someone to use an arbitrarily large string and write past the end of the user field storage buffer. This allows 
the possibility of remote code injection.

External References:

http://downloads.asterisk.org/pub/security/AST-2017-001.html

Upstream patches:

[Asterisk 13] http://downloads.asterisk.org/pub/security/AST-2017-001-13.diff
[Asterisk 14] http://downloads.asterisk.org/pub/security/AST-2017-001-14.diff

Upstream bug:

https://issues.asterisk.org/jira/browse/ASTERISK-26897


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Thomas Deutschmann (RETIRED) gentoo-dev 2017-06-04 21:41:24 UTC
Doesn't affect our stable version (11.25.1).

I bumped to masked v13.x release (https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=ddf1da777ba1363c0c0aea3729a9a519d7da2ddc).

All done, repository is clean.