lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 28 Feb 2019 14:29:57 -0600
From: "Asterisk Security Team" <security@...erisk.org>
To: fulldisclosure@...lists.org
Subject: [FD] AST-2019-001: Remote crash vulnerability with SDP protocol
	violation

               Asterisk Project Security Advisory - AST-2019-001

         Product        Asterisk                                              
         Summary        Remote crash vulnerability with SDP protocol          
                        violation                                             
    Nature of Advisory  Denial Of Service                                     
      Susceptibility    Remote Authenticated Sessions                         
         Severity       Low                                                   
      Exploits Known    No                                                    
       Reported On      January 24, 2019                                      
       Reported By      Sotiris Ganouris                                      
        Posted On       November 14,2018                                      
     Last Updated On    
     Advisory Contact   gjoseph AT digium DOT com                             
         CVE Name       CVE-2019-7251                                         

    Description  When Asterisk makes an outgoing call, a very specific SDP    
                 protocol violation by the remote party can cause Asterisk    
                 to crash.                                                    

    Resolution  Upgrade Asterisk to a fixed version.                          

                               Affected Versions       
                         Product                       Release  
                                                       Series   
                  Asterisk Open Source                  15.x    All releases  
                  Asterisk Open Source                  16.x    All releases  

                                  Corrected In         
                         Product                              Release         
                  Asterisk Open Source                        15.7.2          
                  Asterisk Open Source                        16.2.1          

                                    Patches                          
                                SVN URL                              Revision 
   http://downloads.asterisk.org/pub/security/AST-2019-001-15.diff   Asterisk 
                                                                     15       
   http://downloads.asterisk.org/pub/security/AST-2019-001-16.diff   Asterisk 
                                                                     16       

    Links  https://issues.asterisk.org/jira/browse/ASTERISK-28260             

    Asterisk Project Security Advisories are posted at                        
    http://www.asterisk.org/security                                          
                                                                              
    This document may be superseded by later versions; if so, the latest      
    version will be posted at                                                 
    http://downloads.digium.com/pub/security/AST-2019-001.pdf and             
    http://downloads.digium.com/pub/security/AST-2019-001.html                

                                Revision History
                     Date                       Editor       Revisions Made   
    January 31, 2019                         George Joseph  Initial revision  

               Asterisk Project Security Advisory - AST-2019-001
              Copyright (c) 2018 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists