Asterisk
Project Security Advisory –
|
Product |
Asterisk |
|
Summary |
Remote crash vulnerability in Skinny channel driver |
|
Nature of Advisory |
Denial of Service |
|
Susceptibility |
Remote Unauthenticated Sessions |
|
Severity |
Critical |
|
Exploits Known |
No |
|
Reported On |
July 13, 2007 |
|
Reported By |
Will Drewry, Google Security Team |
|
Posted On |
July 17, 2007 |
|
Last Updated On |
|
|
Advisory Contact |
Jason Parker <jparker@digium.com> |
|
CVE Name |
CVE-2007-3764 |
|
Description |
The Asterisk Skinny channel driver, chan_skinny, has a remotely exploitable crash vulnerability. A segfault can occur when Asterisk receives a packet where the claimed length of the data is between 0 and 3, followed by length + 4 or more bytes, due to an overly large memcpy. The side effects of this extremely large memcpy have not been investigated. |
|
Resolution |
All users that have chan_skinny enabled should upgrade to the appropriate version listed in the corrected in section of this advisory. As a workaround, users who do not require chan_skinny may add the line “noload => chan_skinny.so” (without quotes) to /etc/asterisk/modules.conf, and restart Asterisk. |
|
Affected Versions |
||
|
Product |
Release Series |
|
|
Asterisk Open Source |
1.0.x |
All versions |
|
Asterisk Open Source |
1.2.x |
All versions prior to 1.2.22 |
|
Asterisk Open Source |
1.4.x |
All versions prior to 1.4.8 |
|
Asterisk Business Edition |
A.x.x |
All versions |
|
Asterisk Business Edition |
B.x.x |
All versions prior to B.2.2.1 |
|
AsteriskNOW |
pre-release |
All versions prior to beta7 |
|
Asterisk Appliance Developer Kit |
0.x.x |
All versions prior to 0.5.0 |
|
s800i (Asterisk Appliance) |
1.0.x |
All versions prior to 1.0.2 |
|
Corrected In |
|
|
Product |
Release |
|
Asterisk Open Source |
1.2.22 and 1.4.8, available from http://downloads.digium.com/pub/telephony/asterisk |
|
Asterisk Business Edition |
B.2.2.1, available from the Asterisk Business Edition user portal on http://www.digium.com or via Digium Technical Support |
|
AsteriskNOW |
Beta7, available from http://www.asterisknow.org/. Beta5 and Beta6 users can update using the system update feature in the appliance control panel. |
|
Asterisk Appliance Developer Kit |
0.5.0, available from http://downloads.digium.com/pub/telephony/aadk/ |
|
s800i (Asterisk Appliance) |
1.0.2 |
|
Links |
|
|
Asterisk Project Security Advisories are posted at http://www.asterisk.org/security. This document may be superseded by later
versions; if so, the latest version will be posted at
http://downloads.digium.com/pub/asa/ |
|
Revision History |
||
|
Date |
Editor |
Revisions Made |
|
July 17, 2007 |
Initial Release |
|
|
August 21, 2007 |
russell@digium.com |
Changed name prefix from ASA to AST, changed ftp.digium.com to downloads.digium.com |
Asterisk
Project Security Advisory -
Copyright
©
Permission is hereby granted
to distribute and publish this advisory in its original, unaltered
form.