Asterisk
	Project Security Advisory – 
| Product | Asterisk | 
| Summary | Remote crash vulnerability in Skinny channel driver | 
| Nature of Advisory | Denial of Service | 
| Susceptibility | Remote Unauthenticated Sessions | 
| Severity | Critical | 
| Exploits Known | No | 
| Reported On | July 13, 2007 | 
| Reported By | Will Drewry, Google Security Team | 
| Posted On | July 17, 2007 | 
| Last Updated On |  | 
| Advisory Contact | Jason Parker <jparker@digium.com> | 
| CVE Name | CVE-2007-3764 | 
| Description | The Asterisk Skinny channel driver, chan_skinny, has a remotely exploitable crash vulnerability. A segfault can occur when Asterisk receives a packet where the claimed length of the data is between 0 and 3, followed by length + 4 or more bytes, due to an overly large memcpy. The side effects of this extremely large memcpy have not been investigated. | 
| Resolution | All users that have chan_skinny enabled should upgrade to the appropriate version listed in the corrected in section of this advisory. As a workaround, users who do not require chan_skinny may add the line “noload => chan_skinny.so” (without quotes) to /etc/asterisk/modules.conf, and restart Asterisk. | 
| Affected Versions | ||
| Product | Release Series | 
 | 
| Asterisk Open Source | 1.0.x | All versions | 
| Asterisk Open Source | 1.2.x | All versions prior to 1.2.22 | 
| Asterisk Open Source | 1.4.x | All versions prior to 1.4.8 | 
| Asterisk Business Edition | A.x.x | All versions | 
| Asterisk Business Edition | B.x.x | All versions prior to B.2.2.1 | 
| AsteriskNOW | pre-release | All versions prior to beta7 | 
| Asterisk Appliance Developer Kit | 0.x.x | All versions prior to 0.5.0 | 
| s800i (Asterisk Appliance) | 1.0.x | All versions prior to 1.0.2 | 
| Corrected In | |
| Product | Release | 
| Asterisk Open Source | 1.2.22 and 1.4.8, available from http://downloads.digium.com/pub/telephony/asterisk | 
| Asterisk Business Edition | B.2.2.1, available from the Asterisk Business Edition user portal on http://www.digium.com or via Digium Technical Support | 
| AsteriskNOW | Beta7, available from http://www.asterisknow.org/. Beta5 and Beta6 users can update using the system update feature in the appliance control panel. | 
| Asterisk Appliance Developer Kit | 0.5.0, available from http://downloads.digium.com/pub/telephony/aadk/ | 
| s800i (Asterisk Appliance) | 1.0.2 | 
| Links | 
 | 
| Asterisk Project Security Advisories are posted at http://www.asterisk.org/security. This document may be superseded by later
			versions; if so, the latest version will be posted at
			http://downloads.digium.com/pub/asa/ | 
| Revision History | ||
| Date | Editor | Revisions Made | 
| July 17, 2007 | Initial Release | |
| August 21, 2007 | russell@digium.com | Changed name prefix from ASA to AST, changed ftp.digium.com to downloads.digium.com | 
Asterisk
	Project Security Advisory - 
Copyright
	© 
Permission is hereby granted
	to distribute and publish this advisory in its original, unaltered
	form.