Bug#697230: asterisk: Two security issues: AST-2012-014 / AST-2012-015

Tzafrir Cohen tzafrir.cohen at xorcom.com
Tue Jan 8 00:45:59 UTC 2013


Hi,

On Wed, Jan 02, 2013 at 10:56:43PM +0100, Salvatore Bonaccorso wrote:
> Package: asterisk
> Severity: grave
> Tags: security
> Justification: user security hole
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA512
> 
> Hi,
> 
> the following vulnerabilities were published for asterisk.
> 
> CVE-2012-5976[0]:
> Crashes due to large stack allocations when using TCP
> 
> CVE-2012-5977[1]:
> Denial of Service Through Exploitation of Device State Caching
> 
> If you fix the vulnerabilities please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.
> 
> For further information see:
> 
> [0] http://security-tracker.debian.org/tracker/CVE-2012-5976
> [1] http://security-tracker.debian.org/tracker/CVE-2012-5977
> 
> Please adjust the affected versions in the BTS as needed.
> 
> According to the advisories all 1.8.x versions seems affected.

Likewise is version 1.6.2 from Stable. I have fixes ready.

On a side note, I'm not sure why
https://security-tracker.debian.org/tracker/CVE-2011-2666 is listed as
open. The respective bug has been closed:
As I mentioned before, I can change the default for alwaysauthreject,
I'm just not sure this should be done on a Stable package.

-- 
               Tzafrir Cohen
icq#16849755              jabber:tzafrir.cohen at xorcom.com
+972-50-7952406           mailto:tzafrir.cohen at xorcom.com
http://www.xorcom.com  iax:guest at local.xorcom.com/tzafrir



More information about the Pkg-voip-maintainers mailing list