Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

AST-2011-004:
From: "Asterisk Security Team" <security () asterisk org>
Date: Wed, 16 Mar 2011 17:51:10 -0500

   Product            Asterisk                                                
   Summary            Remote crash vulnerability in TCP/TLS server            
   Nature of Advisory Denial of Service                                       
   Susceptibility     Remote Unauthenticated Sessions                         
   Severity           Critical                                                
   Exploits Known     No                                                      
   Reported On        March 1, 2011                                           
   Reported By        Blake Cornell <blake () remoteorigin com> and Chris Maj          
                      <chris () penguinpbx com>                                  
   Posted On          March 16, 2011                                          
   Last Updated On    March 14, 2011                                          
   Advisory Contact   Terry Wilson <twilson () digium com>                       

    

               Rapidly opening and closing TCP connections to services using  
   Description the ast_tcptls_* API (primarily chan_sip, manager, and         
               res_phoneprov) can cause Asterisk to crash after dereferencing 
               a NULL pointer.                                                

    

   Resolution Failure of the fdopen call is detected and dereferencing the    
              NULL pointer is avoided.                                        

    

   Affected Versions                 
   Product                           Release Series                           
   Asterisk Open Source              1.6.1.x         All versions             
   Asterisk Open Source              1.6.2.x         All versions             
   Asterisk Open Source              1.8.x           All versions             

    

   Corrected In                     
   Product                          Release                                   
   Asterisk Open Source             1.6.1.23, 1.6.2.17.1, 1.8.3.1             
                                                                              
                                                                              

   Patches                                                             
   URL                                                                 Branch 
   http://downloads.asterisk.org/pub/security/AST-2011-004-1.6.1.diff  1.6.1  
   http://downloads.asterisk.org/pub/security/AST-2011-004-1.6.2.diff  1.6.2  
   http://downloads.asterisk.org/pub/security/AST-2011-004-1.8.diff    1.8    

    

    

   Links                                                                      

    

   Asterisk Project Security Advisories are posted at                         
   http://www.asterisk.org/security                                           
                                                                              
   This document may be superseded by later versions; if so, the latest       
   version will be posted at                                                  
   http://downloads.digium.com/pub/security/AST-2011-004.pdf and              
   http://downloads.digium.com/pub/security/AST-2011-004.html                 

    

   Revision History       
   Date                   Editor                   Revisions Made             
   2011-03-14             Terry Wilson             Initial release            

    

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


  By Date           By Thread  

Current thread:
  • AST-2011-004: Asterisk Security Team (Mar 16)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]