[asteriskteam at digium.com: [asterisk-dev] ASA-2007-016: Remote crash vulnerability in Skinny channel driver]

Tzafrir Cohen tzafrir.cohen at xorcom.com
Thu Jul 19 03:58:00 UTC 2007


Affects the Etch version,

http://svn.digium.com/view/asterisk?view=rev&revision=75449

Fixed in 1.2.22 and 1.4.8 .

----- Forwarded message from The Asterisk Development Team <asteriskteam at digium.com> -----

Envelope-to: tzafrir.cohen at xorcom.com
Date: Tue, 17 Jul 2007 17:28:40 -0500
From: The Asterisk Development Team <asteriskteam at digium.com>
Organization: Digium, Inc.
To: undisclosed-recipients: ;
Subject: [asterisk-dev] ASA-2007-016: Remote crash vulnerability in Skinny
	channel driver
Reply-To: Asterisk Developers Mailing List <asterisk-dev at lists.digium.com>

               Asterisk Project Security Advisory - ASA-2007-016

   +------------------------------------------------------------------------+
   |      Product       | Asterisk                                          |
   |--------------------+---------------------------------------------------|
   |      Summary       | Remote crash vulnerability in Skinny channel      |
   |                    | driver                                            |
   |--------------------+---------------------------------------------------|
   | Nature of Advisory | Denial of Service                                 |
   |--------------------+---------------------------------------------------|
   |   Susceptibility   | Remote Unauthenticated Sessions                   |
   |--------------------+---------------------------------------------------|
   |      Severity      | Critical                                          |
   |--------------------+---------------------------------------------------|
   |   Exploits Known   | No                                                |
   |--------------------+---------------------------------------------------|
   |    Reported On     | July 13, 2007                                     |
   |--------------------+---------------------------------------------------|
   |    Reported By     | Will Drewry, Google Security Team                 |
   |--------------------+---------------------------------------------------|
   |     Posted On      | July 17, 2007                                     |
   |--------------------+---------------------------------------------------|
   |  Last Updated On   | July 17, 2007                                     |
   |--------------------+---------------------------------------------------|
   |  Advisory Contact  | Jason Parker <jparker at digium.com>                 |
   |--------------------+---------------------------------------------------|
   |      CVE Name      | CVE-2007-3764                                     |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   | Description | The Asterisk Skinny channel driver, chan_skinny, has a   |
   |             | remotely exploitable crash vulnerability. A segfault can |
   |             | occur when Asterisk receives a packet where the claimed  |
   |             | length of the data is between 0 and 3, followed by       |
   |             | length + 4 or more bytes, due to an overly large memcpy. |
   |             | The side effects of this extremely large memcpy have not |
   |             | been investigated.                                       |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   | Resolution | All users that have chan_skinny enabled should upgrade to |
   |            | the appropriate version listed in the corrected in        |
   |            | section of this advisory. As a workaround, users who do   |
   |            | not require chan_skinny may add the line "noload =>       |
   |            | chan_skinny.so" (without quotes) to                       |
   |            | /etc/asterisk/modules.conf, and restart Asterisk.         |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   |                           Affected Versions                            |
   |------------------------------------------------------------------------|
   |             Product              |   Release   |                       |
   |                                  |   Series    |                       |
   |----------------------------------+-------------+-----------------------|
   |       Asterisk Open Source       |    1.0.x    | All versions          |
   |----------------------------------+-------------+-----------------------|
   |       Asterisk Open Source       |    1.2.x    | All versions prior to |
   |                                  |             | 1.2.22                |
   |----------------------------------+-------------+-----------------------|
   |       Asterisk Open Source       |    1.4.x    | All versions prior to |
   |                                  |             | 1.4.8                 |
   |----------------------------------+-------------+-----------------------|
   |    Asterisk Business Edition     |    A.x.x    | All versions          |
   |----------------------------------+-------------+-----------------------|
   |    Asterisk Business Edition     |    B.x.x    | All versions prior to |
   |                                  |             | B.2.2.1               |
   |----------------------------------+-------------+-----------------------|
   |           AsteriskNOW            | pre-release | All versions prior to |
   |                                  |             | beta7                 |
   |----------------------------------+-------------+-----------------------|
   | Asterisk Appliance Developer Kit |    0.x.x    | All versions prior to |
   |                                  |             | 0.5.0                 |
   |----------------------------------+-------------+-----------------------|
   |    s800i (Asterisk Appliance)    |    1.0.x    | All versions prior to |
   |                                  |             | 1.0.2                 |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   |                              Corrected In                              |
   |------------------------------------------------------------------------|
   |      Product       |                      Release                      |
   |--------------------+---------------------------------------------------|
   |   Asterisk Open    |         1.2.22 and 1.4.8, available from          |
   |       Source       |    ftp://ftp.digium.com/pub/telephony/asterisk    |
   |--------------------+---------------------------------------------------|
   | Asterisk Business  |   B.2.2.1, available from the Asterisk Business   |
   |      Edition       |  Edition user portal on http://www.digium.com or  |
   |                    |                                                   |
   |                    |           via Digium Technical Support            |
   |--------------------+---------------------------------------------------|
   |    AsteriskNOW     |               Beta7, available from               |
   |                    |   http://www.asterisknow.org/. Beta5 and Beta6    |
   |                    | users can update using the system update feature  |
   |                    |          in the appliance control panel.          |
   |--------------------+---------------------------------------------------|
   | Asterisk Appliance |               0.5.0, available from               |
   |   Developer Kit    |                                                   |
   |                    |     ftp://ftp.digium.com/pub/telephony/aadk/      |
   |--------------------+---------------------------------------------------|
   |  s800i (Asterisk   |                       1.0.2                       |
   |     Appliance)     |                                                   |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   |        Links        |                                                  |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   | Asterisk Project Security Advisories are posted at                     |
   | http://www.asterisk.org/security.                                      |
   |                                                                        |
   | This document may be superseded by later versions; if so, the latest   |
   | version will be posted at                                              |
   | http://ftp.digium.com/pub/asa/ASA-2007-016.pdf.                        |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   |                            Revision History                            |
   |------------------------------------------------------------------------|
   |       Date        |         Editor          |      Revisions Made      |
   |-------------------+-------------------------+--------------------------|
   | July 17, 2007     | jparker at digium.com      | Initial Release          |
   +------------------------------------------------------------------------+

               Asterisk Project Security Advisory - ASA-2007-016
              Copyright (c) 2007 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.

_______________________________________________
--Bandwidth and Colocation Provided by http://www.api-digital.com--

asterisk-dev mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-dev

----- End forwarded message -----

-- 
               Tzafrir Cohen       
icq#16849755                    jabber:tzafrir at jabber.org
+972-50-7952406           mailto:tzafrir.cohen at xorcom.com       
http://www.xorcom.com  iax:guest at local.xorcom.com/tzafrir



More information about the Pkg-voip-maintainers mailing list