Asterisk
Project Security Advisory -
|
Product |
Asterisk |
|
Summary |
Format String Vulnerability in Logger and Manager |
|
Nature of Advisory |
Denial of Service |
|
Susceptibility |
Remote Unauthenticated Sessions |
|
Severity |
Moderate |
|
Exploits Known |
No |
|
Reported On |
March 13, 2008 |
|
Reported By |
Steve Davies (bugs.digium.com user stevedavies) Brandon Kruse (bugs.digium.com user bkruse) |
|
Posted On |
March 18, 2008 |
|
Last Updated On |
|
|
Advisory Contact |
Joshua Colp <jcolp@digium.com> |
|
CVE Name |
CVE-2008-1333 |
|
Description |
Logging messages displayed using the ast_verbose logging API call are not displayed as a character string, they are displayed as a format string.
Output as a result of the Manager command “command” is not appended to the resulting response message as a character string, it is appended as a format string.
It is possible in both instances for an attacker to provide a formatted string as a value for input which can cause a crash. |
|
Resolution |
Input given to both the ast_verbose logging API call and astman_append function is now interpreted as a character string and not as a format string. |
|
Affected Versions |
||
|
Product |
Release Series |
|
|
Asterisk Open Source |
1.0.x |
Unaffected |
|
Asterisk Open Source |
1.2.x |
Unaffected |
|
Asterisk Open Source |
1.4.x |
Unaffected |
|
Asterisk Open Source |
1.6.x |
All versions prior to 1.6.0-beta6 |
|
Asterisk Business Edition |
A.x.x |
Unaffected |
|
Asterisk Business Edition |
B.x.x |
Unaffected |
|
Asterisk Business Edition |
C.x.x |
Unaffected |
|
AsteriskNOW |
1.0.x |
Unaffected |
|
Asterisk Appliance Developer Kit |
0.x.x |
Unaffected |
|
s800i (Asterisk Appliance) |
1.0.x |
Unaffected |
|
Corrected In |
|
|
Product |
Release |
|
Asterisk Open Source |
1.6.0-beta6, available from http://downloads.digium.com/pub/telephony/asterisk |
|
Patches |
|
|
URL |
Version |
|
http://downloads.digium.com/pub/security/AST-2008-004-1.6.0.patch |
1.6.0 |
|
Links |
http://bugs.digium.com/view.php?id=12205 http://bugs.digium.com/view.php?id=12206 |
|
Asterisk Project Security Advisories are posted at http://www.asterisk.org/security This document may be superseded by later
versions; if so, the latest version will be posted at
http://downloads.digium.com/pub/security/ |
|
Revision History |
||
|
Date |
Editor |
Revisions Made |
|
2008-03-18 |
Joshua Colp |
Initial Release |
|
2008-12-15 |
Joshua Colp |
Add Patches |
Asterisk
Project Security Advisory -
Copyright
©
Permission is hereby granted
to distribute and publish this advisory in its original, unaltered
form.