Articles / Debian: Security update for...

Debian: Security update for asterisk

Several vulnerabilities have been discovered in Asterisk, an Open Source PBX and telephony toolkit. Ben Williams discovered that it was possible to enumerate SIP user names in some configurations. Kristijan Vrban discovered that Asterisk can be crashed with malformed SIP packets if the “automon” feature is enabled. Updated packages are available from security.debian.org.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2367-1                   security@debian.org
http://www.debian.org/security/                        Moritz Muehlenhoff
December 19, 2011                      http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : asterisk
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-2011-4597 CVE-2011-4598 
Debian Bug     : 

Several vulnerabilities have been discovered in Asterisk, an Open 
Source PBX and telephony toolkit:

CVE-2011-4597

  Ben Williams discovered that it was possible to enumerate SIP
  user names in some configurations. Please see the upstream
  advisory for details:
  http://downloads.asterisk.org/pub/security/AST-2011-013.html

  This update only modifies the sample sip.conf configuration
  file. Please see README.Debian for more information on how
  to update your installation.

CVE-2011-4598

  Kristijan Vrban discovered that Asterisk can be crashed with
  malformed SIP packets if the "automon" feature is enabled.

For the oldstable distribution (lenny), this problem has been fixed in
version 1:1.4.21.2~dfsg-3+lenny6.

For the stable distribution (squeeze), this problem has been fixed in
version 1:1.6.2.9-2+squeeze4.

For the unstable distribution (sid), this problem has been fixed in
version 1:1.8.8.0~dfsg-1.

We recommend that you upgrade your asterisk packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk7vfTgACgkQXm3vHE4uylrWWQCfYKjpcyNYLZimQkB2XrqlfHQP
qrgAn0NwesjM+b6yo6xP3J4b+uF0zb+E
=U/2x
-----END PGP SIGNATURE-----
Screenshot

Project Spotlight

csv2html

A flexible utility and Python module for converting CSV files into HTML tables.

Screenshot

Project Spotlight

TAO Translator

An online translator with some advanced features.