DSA-1358-1 asterisk -- several vulnerabilities

Related Vulnerabilities: CVE-2007-1306   CVE-2007-1561   CVE-2007-2294   CVE-2007-2297   CVE-2007-2488   CVE-2007-3762   CVE-2007-3763   CVE-2007-3764  

Several remote vulnerabilities have been discovered in Asterisk, a free software PBX and telephony toolkit. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-1306 Mu Security discovered that a NULL pointer dereference in the SIP implementation could lead to denial of service. CVE-2007-1561 Inria Lorraine discovered that a programming error in the SIP implementation could lead to denial of service. CVE-2007-2294 It was discovered that a NULL pointer dereference in the manager interface could lead to denial of service. CVE-2007-2297 It was discovered that a programming error in the SIP implementation could lead to denial of service. CVE-2007-2488 Tim Panton and Birgit Arkestein discovered that a programming error in the IAX2 implementation could lead to information disclosure. CVE-2007-3762 Russell Bryant discovered that a buffer overflow in the IAX implementation could lead to the execution of arbitrary code. CVE-2007-3763 Chris Clark and Zane Lackey discovered that several NULL pointer dereferences in the IAX2 implementation could lead to denial of service. CVE-2007-3764 Will Drewry discovered that a programming error in the Skinny implementation could lead to denial of service. For the oldstable distribution (sarge) these problems have been fixed in version 1.0.7.dfsg.1-2sarge5. For the stable distribution (etch) these problems have been fixed in version 1:1.2.13~dfsg-2etch1. For the unstable distribution (sid) these problems have been fixed in version 1:1.4.11~dfsg-1. We recommend that you upgrade your Asterisk packages.

Debian Security Advisory

DSA-1358-1 asterisk -- several vulnerabilities

Date Reported:
26 Aug 2007
Affected Packages:
asterisk
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2007-1306, CVE-2007-1561, CVE-2007-2294, CVE-2007-2297, CVE-2007-2488, CVE-2007-3762, CVE-2007-3763, CVE-2007-3764.
More information:

Several remote vulnerabilities have been discovered in Asterisk, a free software PBX and telephony toolkit. The Common Vulnerabilities and Exposures project identifies the following problems:

  • CVE-2007-1306

    Mu Security discovered that a NULL pointer dereference in the SIP implementation could lead to denial of service.

  • CVE-2007-1561

    Inria Lorraine discovered that a programming error in the SIP implementation could lead to denial of service.

  • CVE-2007-2294

    It was discovered that a NULL pointer dereference in the manager interface could lead to denial of service.

  • CVE-2007-2297

    It was discovered that a programming error in the SIP implementation could lead to denial of service.

  • CVE-2007-2488

    Tim Panton and Birgit Arkestein discovered that a programming error in the IAX2 implementation could lead to information disclosure.

  • CVE-2007-3762

    Russell Bryant discovered that a buffer overflow in the IAX implementation could lead to the execution of arbitrary code.

  • CVE-2007-3763

    Chris Clark and Zane Lackey discovered that several NULL pointer dereferences in the IAX2 implementation could lead to denial of service.

  • CVE-2007-3764

    Will Drewry discovered that a programming error in the Skinny implementation could lead to denial of service.

For the oldstable distribution (sarge) these problems have been fixed in version 1.0.7.dfsg.1-2sarge5.

For the stable distribution (etch) these problems have been fixed in version 1:1.2.13~dfsg-2etch4.

For the unstable distribution (sid) these problems have been fixed in version 1:1.4.11~dfsg-1.

We recommend that you upgrade your Asterisk packages.

Fixed in:

Debian GNU/Linux 3.1 (sarge)

Source:
http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.0.7.dfsg.1-2sarge5.dsc
http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.0.7.dfsg.1-2sarge5.diff.gz
http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.0.7.dfsg.1.orig.tar.gz
Architecture-independent component:
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-config_1.0.7.dfsg.1-2sarge5_all.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-dev_1.0.7.dfsg.1-2sarge5_all.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-doc_1.0.7.dfsg.1-2sarge5_all.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-sounds-main_1.0.7.dfsg.1-2sarge5_all.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-web-vmail_1.0.7.dfsg.1-2sarge5_all.deb
Alpha:
http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.0.7.dfsg.1-2sarge5_alpha.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-gtk-console_1.0.7.dfsg.1-2sarge5_alpha.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h423_1.0.7.dfsg.1-2sarge5_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.0.7.dfsg.1-2sarge5_amd64.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-gtk-console_1.0.7.dfsg.1-2sarge5_amd64.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h423_1.0.7.dfsg.1-2sarge5_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.0.7.dfsg.1-2sarge5_arm.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-gtk-console_1.0.7.dfsg.1-2sarge5_arm.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h423_1.0.7.dfsg.1-2sarge5_arm.deb
HPPA:
http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.0.7.dfsg.1-2sarge5_hppa.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-gtk-console_1.0.7.dfsg.1-2sarge5_hppa.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h423_1.0.7.dfsg.1-2sarge5_hppa.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.0.7.dfsg.1-2sarge5_i386.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-gtk-console_1.0.7.dfsg.1-2sarge5_i386.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h423_1.0.7.dfsg.1-2sarge5_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.0.7.dfsg.1-2sarge5_ia64.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-gtk-console_1.0.7.dfsg.1-2sarge5_ia64.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h423_1.0.7.dfsg.1-2sarge5_ia64.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.0.7.dfsg.1-2sarge5_m68k.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-gtk-console_1.0.7.dfsg.1-2sarge5_m68k.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h423_1.0.7.dfsg.1-2sarge5_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.0.7.dfsg.1-2sarge5_mips.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-gtk-console_1.0.7.dfsg.1-2sarge5_mips.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h423_1.0.7.dfsg.1-2sarge5_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.0.7.dfsg.1-2sarge5_mipsel.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-gtk-console_1.0.7.dfsg.1-2sarge5_mipsel.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h423_1.0.7.dfsg.1-2sarge5_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.0.7.dfsg.1-2sarge5_powerpc.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-gtk-console_1.0.7.dfsg.1-2sarge5_powerpc.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h423_1.0.7.dfsg.1-2sarge5_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.0.7.dfsg.1-2sarge5_s390.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-gtk-console_1.0.7.dfsg.1-2sarge5_s390.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h423_1.0.7.dfsg.1-2sarge5_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.0.7.dfsg.1-2sarge5_sparc.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-gtk-console_1.0.7.dfsg.1-2sarge5_sparc.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h423_1.0.7.dfsg.1-2sarge5_sparc.deb

Debian GNU/Linux 4.0 (etch)

Source:
http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.2.13~dfsg-2etch4.dsc
http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.2.13~dfsg-2etch4.diff.gz
http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.2.13~dfsg.orig.tar.gz
Architecture-independent component:
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-config_1.2.13~dfsg-2etch4_all.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-dev_1.2.13~dfsg-2etch4_all.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-doc_1.2.13~dfsg-2etch4_all.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-sounds-main_1.2.13~dfsg-2etch4_all.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-web-vmail_1.2.13~dfsg-2etch4_all.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.2.13~dfsg-2etch4_all.deb
Alpha:
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-bristuff_1.2.13~dfsg-2etch4_alpha.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-classic_1.2.13~dfsg-2etch4_alpha.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h423_1.2.13~dfsg-2etch4_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-bristuff_1.2.13~dfsg-2etch4_amd64.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-classic_1.2.13~dfsg-2etch4_amd64.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h423_1.2.13~dfsg-2etch4_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-bristuff_1.2.13~dfsg-2etch4_arm.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-classic_1.2.13~dfsg-2etch4_arm.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h423_1.2.13~dfsg-2etch4_arm.deb
HPPA:
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-bristuff_1.2.13~dfsg-2etch4_hppa.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-classic_1.2.13~dfsg-2etch4_hppa.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h423_1.2.13~dfsg-2etch4_hppa.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-bristuff_1.2.13~dfsg-2etch4_i386.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-classic_1.2.13~dfsg-2etch4_i386.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h423_1.2.13~dfsg-2etch4_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-bristuff_1.2.13~dfsg-2etch4_ia64.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-classic_1.2.13~dfsg-2etch4_ia64.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h423_1.2.13~dfsg-2etch4_ia64.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-bristuff_1.2.13~dfsg-2etch4_mips.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-classic_1.2.13~dfsg-2etch4_mips.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h423_1.2.13~dfsg-2etch4_mips.deb
PowerPC:
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-bristuff_1.2.13~dfsg-2etch4_powerpc.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-classic_1.2.13~dfsg-2etch4_powerpc.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h423_1.2.13~dfsg-2etch4_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-bristuff_1.2.13~dfsg-2etch4_s390.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-classic_1.2.13~dfsg-2etch4_s390.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h423_1.2.13~dfsg-2etch4_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-bristuff_1.2.13~dfsg-2etch4_sparc.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-classic_1.2.13~dfsg-2etch4_sparc.deb
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h423_1.2.13~dfsg-2etch4_sparc.deb

MD5 checksums of the listed files are available in the original advisory.