Bug#434886: Remote compromise [CVE-2007-3762] [CVE-2007-3763] [CVE-2007-3764] [CVE-2007-3765]
Adam Majer
adamm at zombino.com
Fri Jul 27 14:07:05 UTC 2007
Package: asterisk
Severity: critical
Tags: security
3 of 4 problems seem to affect Etch and Sarge. Sid *may* be unaffected
based on version number.
>From http://secunia.com/advisories/26099/
DESCRIPTION:
Some vulnerabilities have been reported in Asterisk, which can be
exploited by malicious people to cause a DoS (Denial of Service) and
potentially compromise a vulnerable system.
1) A boundary error exists in the Asterisk STUN implementation, which
can be exploited to cause the application to crash via specially
crafted RTP packets.
Successful exploitation requires that the chan_sip, chan_gtalk,
chan_jingle, chan_h323, chan_mgcp, or chan_skinny is enabled.
The vulnerability is reported in the following products:
Asterisk Open Source 1.4.x prior to version 1.4.8
AsteriskNOW pre-release prior to version beta7
Asterisk Appliance Developer Kit prior to version 0.5.0
s800i 1.0.x prior to version 1.0.2.
2) A boundary error exists in the Asterisk Skinny channel driver
(chan_skinny), which can be exploited to cause the application to
crash via packets that contain a size field smaller than the actual
size of the packet.
Successful exploitation requires that chan_skinny is enabled.
3) A NULL-pointer dereference error exists in the Asterisk IAX2
channel driver (chan_iax2), which can be exploited to cause a DoS via
specially crafted LGRQ and LAGRP frames.
Successful exploitation requires that chan_iax is enabled.
4) A boundary error exists in the Asterisk IAX2 channel driver
(chan_iax2) within the handling of RTP frames. This can be exploited
to cause a stack-based buffer overflow by sending large data payloads
(more than 4096 bytes) in a voice or video frame.
Successful exploitation of this vulnerability allows execution of
arbitrary code, but requires that the system is configured to connect
channels that use RTP and IAX channels.
Vulnerabilities #2, #3, and #4 are reported in the following
products:
Asterisk Open Source 1.0.x
Asterisk Open Source 1.2.x prior to version 1.2.22
Asterisk Open Source 1.4.x prior to version 1.4.8
AsteriskNOW pre-release prior to version beta7
Asterisk Business Edition A.x.x
Asterisk Business Edition B.x.x prior to version B.2.2.1
Asterisk Appliance Developer Kit prior to version 0.5.0
s800i 1.0.x prior to version 1.0.2.
SOLUTION:
Asterisk Open Source 1.2.x:
Update to version 1.2.22.
ftp://ftp.digium.com/pub/telephony/asterisk
Asterisk Open Source 1.4.x:
Update to version 1.4.8.
ftp://ftp.digium.com/pub/telephony/asterisk
-- System Information:
Debian Release: lenny/sid
APT prefers unstable
APT policy: (900, 'unstable'), (5, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.22-rc1 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Versions of packages asterisk depends on:
pn asterisk-config <none> (no description available)
pn asterisk-sounds-main <none> (no description available)
ii libasound2 1.0.14a-2 ALSA library
ii libc6 2.6-2 GNU C Library: Shared libraries
ii libgsm1 1.0.10-13 Shared libraries for GSM speech co
ii libncurses5 5.6+20070716-1 Shared libraries for terminal hand
pn libnewt0.51 <none> (no description available)
pn libpq3 <none> (no description available)
pn libpri1 <none> (no description available)
ii libspeex1 1.1.12-3 The Speex Speech Codec
ii libsqlite0 2.8.17-2 SQLite shared library
pn libssl0.9.7 <none> (no description available)
pn libtonezone1 <none> (no description available)
ii unixodbc 2.2.11-15 ODBC tools libraries
ii zlib1g 1:1.2.3.3.dfsg-5 compression library - runtime
asterisk recommends no packages.
More information about the Pkg-voip-maintainers
mailing list