SuSE: 2007-034: asterisk Security Update
Summary
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: asterisk
Announcement ID: SUSE-SA:2007:034
Date: Wed, 06 Jun 2007 18:00:00 +0000
Affected Products: SUSE LINUX 10.1
openSUSE 10.2
Vulnerability Type: remote denial of service
Severity (1-10): 6
SUSE Default Package: no
Cross-References: CVE-2007-1306, CVE-2007-1561, CVE-2007-1594
CVE-2007-1595, CVE-2007-2294, CVE-2007-2297
CVE-2007-2488
Content of This Advisory:
1) Security Vulnerability Resolved:
asterisk security update
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
The Open Source PBX software Asterisk was updated
to fix several security related bugs that allowed attackers to remotely
crash asterisk or cause information leaks:
- CVE-2007-1306: Asterisk allowed remote attackers to cause a denial
of service (crash) by sending a Session Initiation Protocol (SIP)
packet without a URI and SIP-version header, which results in a
NULL pointer dereference.
- CVE-2007-1561: The channel driver in Asterisk allowed remote
attackers to cause a denial of service (crash) via a SIP INVITE
message with an SDP containing one valid and one invalid IP address.
- CVE-2007-1594: The handle_response function in chan_sip.c in Asterisk
allowed remote attackers to cause a denial of service (crash)
via a SIP Response code 0 in a SIP packet.
- CVE-2007-1595: The Asterisk Extension Language (AEL) in pbx/pbx_ael.c
in Asterisk does not properly generate extensions, which allows
remote attackers to execute arbitrary extensions and have an unknown
impact by specifying an invalid extension in a certain form.
- CVE-2007-2294: The Manager Interface in Asterisk allowed
remote attackers to cause a denial of service (crash) by using MD5
authentication to authenticate a user that does not have a password
defined in manager.conf, resulting in a NULL pointer dereference.
- CVE-2007-2297: The SIP channel driver (chan_sip) in Asterisk did not
properly parse SIP UDP packets that do not contain a valid response
code, which allows remote attackers to cause a denial of service
(crash).
- CVE-2007-2488: The IAX2 channel driver (chan_iax2) in Asterisk
did not properly null terminate data, which allows remote attackers to trigger loss of transmitted data, and possibly obtain sensitive
information (memory contents) or cause a denial of service
(application crash), by sending a frame that lacks a 0 byte.
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
None.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv
References