Executive Summary
Summary | |
---|---|
Title | New asterisk packages fix several vulnerabilities |
Informations | |||
---|---|---|---|
Name | DSA-1358 | First vendor Publication | 2007-08-26 |
Vendor | Debian | Last vendor Modification | 2007-08-26 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Several remote vulnerabilities have been discovered in Asterisk, a free software PBX and telephony toolkit. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-1306 "Mu Security" discovered that a NULL pointer deference in the SIP implementation could lead to denial of service. CVE-2007-1561 Inria Lorraine discovered that a programming error in the SIP implementation could lead to denial of service. CVE-2007-2294 It was discovered that a NULL pointer deference in the manager interface could lead to denial of service. CVE-2007-2297 It was discovered that a programming error in the SIP implementation could lead to denial of service. CVE-2007-2488 Tim Panton and Birgit Arkestein discovered that a programming error in the IAX2 implementation could lead to information disclosure. CVE-2007-3762 Russell Bryant discovered that a buffer overflow in the IAX implementation could lead to the execution of arbitrary code. CVE-2007-3763 Chris Clark and Zane Lackey discovered that several NULL pointer deferences in the IAX2 implementation could lead to denial of service. CVE-2007-3764 Will Drewry discovered that a programming error in the Skinny implementation could lead to denial of service. For the oldstable distribution (sarge) these problems have been fixed in version 1.0.7.dfsg.1-2sarge5. For the stable distribution (etch) these problems have been fixed in version 1:1.2.13~dfsg-2etch1. For the unstable distribution (sid) these problems have been fixed in version 1:1.4.11~dfsg-1. We recommend that you upgrade your Asterisk packages. |
Original Source
Url : http://www.debian.org/security/2007/dsa-1358 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:18250 | |||
Oval ID: | oval:org.mitre.oval:def:18250 | ||
Title: | DSA-1358-1 asterisk | ||
Description: | Several remote vulnerabilities have been discovered in Asterisk, a free software PBX and telephony toolkit. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1358-1 CVE-2007-1306 CVE-2007-1561 CVE-2007-2294 CVE-2007-2297 CVE-2007-2488 CVE-2007-3762 CVE-2007-3763 CVE-2007-3764 | Version: | 5 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | asterisk |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-01-28 | Name : SuSE Update for asterisk SUSE-SA:2007:034 File : nvt/gb_suse_2007_034.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200703-14 (asterisk) File : nvt/glsa_200703_14.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200704-01 (asterisk) File : nvt/glsa_200704_01.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200802-11 (asterisk) File : nvt/glsa_200802_11.nasl |
2008-08-22 | Name : Asterisk PBX NULL Pointer Dereference Overflow File : nvt/asterisk_null_pointer_dereference.nasl |
2008-08-22 | Name : Asterisk PBX SDP Header Overflow Vulnerability File : nvt/asterisk_sdp_header_overflow.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 1358-1 (asterisk) File : nvt/deb_1358_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
38196 | Asterisk IAX2 Channel Driver (chan_iax2) RTP Frame Handling Remote Overflow A remote overflow exists in multiple asterisk products. The iax2 channel driver fails to verify boundaries on incoming RTP frames with a voice or video payload larger than 4kB resulting in a stack-based overflow. With a specially crafted request, an attacker can cause a denial of service and possible arbitrary code execution resulting in a loss of integrity and/or availability. |
38195 | Asterisk IAX2 Channel Driver (chan_iax2) Malformed IAX Frame Remote DoS A remote overflow exists in the IAX2 channel driver (chan_iax2). The driver fails to provide proper boundary control on receiving LAGRQ and LAGRP frames resulting in a null pointer overflow. With a specially crafted request, an attacker can cause a denial of service resulting in a loss of availability. |
38194 | Asterisk Skinny Channel Driver (chan_skinny) Crafted Packet Remote DoS Asterisk contains a flaw that may allow a remote denial of service. The issue is triggered when a skinny packet is received where the claimed length is between 0 and 3 added with 4 or more bytes. This will issue a segfault via a large memcpy() and will result in loss of availability for the service. |
35769 | Asterisk IAX2 Channel Driver (chan_iax2) Remote Memory Disclosure |
35369 | Asterisk Manager Interface Passwordless User MD5 Authentication DoS A remote overflow exists in multiple Asterisk releases. The Manager Interface fails to properly verify user-supplied input resulting in a NULL pointer dereference. With a specially crafted MD5 login request, an attacker can cause a denial of service resulting in a loss of availability for the application. |
34482 | Asterisk SIP Channel Driver (chan_sip) SIP Malformed UDP Packet DoS |
34479 | Asterisk Malformed SIP INVITE Request DoS Asterisk PBX contains a flaw that may allow a remote denial of service. The issue is triggered when a malformed SIP INVITE message containing two SDP headers is sent to the affected application. To exploit this issue, the first header must contain a valid IP address where the second must contain an invalid one. This will result in loss of availability for the asterisk service. |
33888 | Asterisk Malformed SIP Register Packet Remote DoS Asterisk PBX contains a flaw that may allow a remote denial of service. The issue is triggered when a malformed SIP REGISTER packet is sent to the affected application without a SIP URI and version header in the request. This will result in a null pointer dereference and a loss of availability for the Asterisk PBX service. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Digium Asterisk invite malformed SDP denial of service attempt RuleID : 23966 - Revision : 6 - Type : PROTOCOL-VOIP |
2014-01-10 | Digium Asterisk IAX2 Channel Driver DoS attempt RuleID : 21768 - Revision : 3 - Type : PROTOCOL-VOIP |
2014-01-10 | Digium Asterisk IAX2 Channel Driver DoS attempt RuleID : 21767 - Revision : 3 - Type : PROTOCOL-VOIP |
2014-01-10 | Digium Asterisk SCCP overly large mem copy attempt RuleID : 21673 - Revision : 4 - Type : PROTOCOL-VOIP |
2014-01-10 | request line equal To zero RuleID : 12061 - Revision : 4 - Type : VOIP-SIP |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2008-02-27 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200802-11.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_asterisk-3543.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_asterisk-3977.nasl - Type : ACT_GATHER_INFO |
2007-08-28 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1358.nasl - Type : ACT_GATHER_INFO |
2007-04-05 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200704-01.nasl - Type : ACT_GATHER_INFO |
2007-03-18 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200703-14.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:26:49 |
|