lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1RFrEf-0003SO-3c@mail.digium.com>
Date: Mon, 17 Oct 2011 12:44:25 -0500
From: "Asterisk Security Team" <security@...erisk.org>
To: full-disclosure@...ts.grok.org.uk
Subject: AST-2011-012: Remote crash vulnerability in SIP
	channel driver

               Asterisk Project Security Advisory - AST-2011-012

          Product         Asterisk                                            
          Summary         Remote crash vulnerability in SIP channel driver    
     Nature of Advisory   Remote crash                                        
       Susceptibility     Remote authenticated sessions                       
          Severity        Critical                                            
       Exploits Known     No                                                  
        Reported On       October 4, 2011                                     
        Reported By       Ehsan Foroughi                                      
         Posted On        October 17, 2011                                    
      Last Updated On     October 17, 2011                                    
      Advisory Contact    Terry Wilson <twilson@...ium.com>                   
          CVE Name        CVE-2011-4063                                       

    Description  A remote authenticated user can cause a crash with a         
                 malformed request due to an unitialized variable.            

    Resolution  Ensure variables are initialized in all cases when parsing    
                the request.                                                  

                               Affected Versions
           Product         Release Series  
    Asterisk Open Source       1.8.x       All versions                       
    Asterisk Open Source        10.x       All versions (currently in beta)   

                                  Corrected In
                  Product                              Release                
            Asterisk Open Source                 1.8.7.1, 10.0.0-rc1          

                                    Patches                         
                             Download URL                           Revision  
   http://downloads.asterisk.org/pub/security/AST-2011-012-1.8.diff 1.8       
   http://downloads.asterisk.org/pub/security/AST-2011-012-10.diff  10        

            Links          

    Asterisk Project Security Advisories are posted at                        
    http://www.asterisk.org/security                                          
                                                                              
    This document may be superseded by later versions; if so, the latest      
    version will be posted at                                                 
    http://downloads.digium.com/pub/security/AST-2011-012.pdf and             
    http://downloads.digium.com/pub/security/AST-2011-012.html                

                                Revision History
           Date                 Editor                 Revisions Made         

               Asterisk Project Security Advisory - AST-2011-012
              Copyright (c) 2011 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ