Your message dated Mon, 10 Apr 2017 12:33:59 +0000
with message-id <[email protected]>
and subject line Bug#859910: fixed in asterisk 1:13.14.1~dfsg-1
has caused the Debian Bug report #859910,
regarding AST-2017-001: Buffer overflow in CDR's set user
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
859910: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859910
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: src:asterisk
Version: 1:13.0.0~dfsg-1
Severity: important
Tags: security patch upstream
See http://downloads.asterisk.org/pub/security/AST-2017-001.html
Asterisk Project Security Advisory - AST-2017-001
Product Asterisk
Summary Buffer overflow in CDR's set user
Nature of Advisory Buffer Overflow
Susceptibility Remote Authenticated Sessions
Severity Moderate
Exploits Known No
Reported On March 27, 2017
Reported By Alex Villacis Lasso
Posted On
Last Updated On April 4, 2017
Advisory Contact kharwell AT digium DOT com
CVE Name
Description No size checking is done when setting the user field on a
CDR. Thus, it is possible for someone to use an arbitrarily
large string and write past the end of the user field
storage buffer. This allows the possibility of remote code
injection.
This currently affects any system using CDR's that also
make use of the following:
* The 'X-ClientCode' header within a SIP INFO message when
using chan_sip and
the 'useclientcode' option is enabled (note, it's disabled
by default).
* The CDR dialplan function executed from AMI when setting
the user field.
* The AMI Monitor action when using a long file name/path.
Resolution The CDR engine now only copies up to the maximum allowed
characters into the user field. Any characters outside the
maximum are truncated.
Affected Versions
Product Release
Series
Asterisk Open Source 13.x All Releases
Asterisk Open Source 14.x All Releases
Certified Asterisk 13.13 All Releases
Corrected In
Product Release
Asterisk Open Source 13.14.1,14.3.1
Certified Asterisk 13.13-cert3
Patches
SVN URL Revision
http://downloads.asterisk.org/pub/security/AST-2017-001-13.diff Asterisk
13
http://downloads.asterisk.org/pub/security/AST-2017-001-14.diff Asterisk
14
http://downloads.asterisk.org/pub/security/AST-2017-001-13.13.diff Certified
Asterisk
13.13
Links https://issues.asterisk.org/jira/browse/ASTERISK-26897
Asterisk Project Security Advisories are posted at
http://www.asterisk.org/security
This document may be superseded by later versions; if so, the latest
version will be posted at
http://downloads.digium.com/pub/security/AST-2017-001.pdf and
http://downloads.digium.com/pub/security/AST-2017-001.html
Revision History
Date Editor Revisions Made
March, 27, 2017 Kevin Harwell Initial Revision
--- End Message ---
--- Begin Message ---
Source: asterisk
Source-Version: 1:13.14.1~dfsg-1
We believe that the bug you reported is fixed in the latest version of
asterisk, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Bernhard Schmidt <[email protected]> (supplier of updated asterisk package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Mon, 10 Apr 2017 12:53:03 +0200
Source: asterisk
Binary: asterisk asterisk-modules asterisk-dahdi asterisk-vpb
asterisk-voicemail asterisk-voicemail-imapstorage
asterisk-voicemail-odbcstorage asterisk-ooh323 asterisk-mp3 asterisk-mysql
asterisk-mobile asterisk-doc asterisk-dev asterisk-config
Architecture: source
Version: 1:13.14.1~dfsg-1
Distribution: unstable
Urgency: medium
Maintainer: Debian VoIP Team <[email protected]>
Changed-By: Bernhard Schmidt <[email protected]>
Description:
asterisk - Open Source Private Branch Exchange (PBX)
asterisk-config - Configuration files for Asterisk
asterisk-dahdi - DAHDI devices support for the Asterisk PBX
asterisk-dev - Development files for Asterisk
asterisk-doc - Source code documentation for Asterisk
asterisk-mobile - Bluetooth phone support for the Asterisk PBX
asterisk-modules - loadable modules for the Asterisk PBX
asterisk-mp3 - MP3 playback support for the Asterisk PBX
asterisk-mysql - MySQL database protocol support for the Asterisk PBX
asterisk-ooh323 - H.323 protocol support for the Asterisk PBX - ooH323c
asterisk-voicemail - simple voicemail support for the Asterisk PBX
asterisk-voicemail-imapstorage - IMAP voicemail storage support for the
Asterisk PBX
asterisk-voicemail-odbcstorage - ODBC voicemail storage support for the
Asterisk PBX
asterisk-vpb - VoiceTronix devices support for the Asterisk PBX
Closes: 859910 859911
Changes:
asterisk (1:13.14.1~dfsg-1) unstable; urgency=medium
.
* New upstream version 13.14.1
- Fixes AST-2017-001 (Buffer overflow in CDR's set user) (Closes: #859910)
* Import upstream fix to set the RTP source address to the address bound by
the PJSIP transport (Closes: #859911)
Checksums-Sha1:
06a358871e5b17cc079e96d19da8c7be0e1eb461 4105 asterisk_13.14.1~dfsg-1.dsc
ad3b0601910c7b9debd8edee25bcfe985666280f 6152096
asterisk_13.14.1~dfsg.orig.tar.xz
3ae6733be7495d5d1567f451116749b1a2a53bf2 129196
asterisk_13.14.1~dfsg-1.debian.tar.xz
2b84c1a2a86e37bda4cd812ec884d69c11f964a5 26165
asterisk_13.14.1~dfsg-1_amd64.buildinfo
Checksums-Sha256:
9d4a3c76d1cfcd0f42a9a5d94630c7dab4d1565ec85f57e5506da5875b487743 4105
asterisk_13.14.1~dfsg-1.dsc
9f52c386cb3eec6f01af7f1e03818280870896defde0da9f8f032db351a642b7 6152096
asterisk_13.14.1~dfsg.orig.tar.xz
80b09af2f649ff4be876cc68a86863e0b0111081c0f8c888f7c4a2cd537dac2e 129196
asterisk_13.14.1~dfsg-1.debian.tar.xz
6bd8c028c147e2a0abfa8d1cc98d89da190f9cd9405c9ccd16c5b0f76880ff2d 26165
asterisk_13.14.1~dfsg-1_amd64.buildinfo
Files:
0f94805175390a87c1c9af208d3b7d2a 4105 comm optional asterisk_13.14.1~dfsg-1.dsc
6db73384168c17ebe6160ba96c5c6209 6152096 comm optional
asterisk_13.14.1~dfsg.orig.tar.xz
67c0c9a53e947082ab777dd03260716f 129196 comm optional
asterisk_13.14.1~dfsg-1.debian.tar.xz
0c0e955cb4b319303de409f8f54175ce 26165 comm optional
asterisk_13.14.1~dfsg-1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=r4u+
-----END PGP SIGNATURE-----
--- End Message ---