Synopsis
The remote Fedora host is missing a security update.
Description
The Asterisk Development Team has announced the release of Asterisk 11.2.0. This release is available for immediate download at http://downloads.asterisk.org/pub/telephony/asterisk
The release of Asterisk 11.2.0 resolves several issues reported by the community and would have not been possible without your participation.
Thank you!
The following is a sample of the issues resolved in this release :
- --- app_meetme: Fix channels lingering when hung up under certain conditions (Closes issue ASTERISK-20486.
Reported by Michael Cargile)
- --- Fix stuck DTMF when bridge is broken. (Closes issue ASTERISK-20492. Reported by Jeremiah Gowdy)
- --- Add missing support for 'who hung up' to chan_motif.
(Closes issue ASTERISK-20671. Reported by Matt Jordan)
- --- Remove a fixed size limitation for producing SDP and change how ICE support is disabled by default. (Closes issue ASTERISK-20643. Reported by coopvr)
- --- Fix chan_sip websocket payload handling (Closes issue ASTERISK-20745. Reported by Inaki Baz Castillo)
- --- Fix pjproject compilation in certain circumstances (Closes issue ASTERISK-20681. Reported by Dinesh Ramjuttun)
For a full list of changes in this release, please see the ChangeLog :
http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.2.0 The Asterisk Development Team has announced a security release for Asterisk 11, Asterisk 11.1.2. This release addresses the security vulnerabilities reported in AST-2012-014 and AST-2012-015, and replaces the previous version of Asterisk 11 released for these security vulnerabilities. The prior release left open a vulnerability in res_xmpp that exists only in Asterisk 11; as such, other versions of Asterisk were resolved correctly by the previous releases.
This release is available for immediate download at http://downloads.asterisk.org/pub/telephony/asterisk/releases
The release of these versions resolve the following two issues :
- Stack overflows that occur in some portions of Asterisk that manage a TCP connection. In SIP, this is exploitable via a remote unauthenticated session; in XMPP and HTTP connections, this is exploitable via remote authenticated sessions. The vulnerabilities in SIP and HTTP were corrected in a prior release of Asterisk; the vulnerability in XMPP is resolved in this release.
- A denial of service vulnerability through exploitation of the device state cache. Anonymous calls had the capability to create devices in Asterisk that would never be disposed of. Handling the cachability of device states aggregated via XMPP is handled in this release.
These issues and their resolutions are described in the security advisories.
For more information about the details of these vulnerabilities, please read security advisories AST-2012-014 and AST-2012-015.
For a full list of changes in the current release, please see the ChangeLog :
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLo g-11.1.2
The security advisories are available at :
- http://downloads.asterisk.org/pub/security/AST-2012-014.
pdf
- http://downloads.asterisk.org/pub/security/AST-2012-01 5.pdf
Thank you for your continued support of Asterisk - and we apologize for having to do this twice!
Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected asterisk package.
Plugin Details
File Name: fedora_2013-1003.nasl
Agent: unix
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P
Vulnerability Information
CPE: cpe:/o:fedoraproject:fedora:18, p-cpe:/a:fedoraproject:fedora:asterisk
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list
Patch Publication Date: 1/20/2013
Vulnerability Publication Date: 1/4/2013