English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 102521 CVE descriptions
and 54701 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2008-2620
2008-03-21 21:42:01
--------------------------------------------------------------------------------

Name        : asterisk
Product     : Fedora 7
Version     : 1.4.18.1
Release     : 1.fc7
URL         : http://www.asterisk.org/
Summary     : The Open Source PBX
Description :
Asterisk is a complete PBX in software. It runs on Linux and provides
all of the features you would expect from a PBX and more. Asterisk
does voice over IP in three protocols, and can interoperate with
almost all standards-based telephony equipment using relatively
inexpensive hardware.

--------------------------------------------------------------------------------
Update Information:

Update to 1.4.18.1 plus another patch to fix some security issues.
AST-2008-002 details two buffer overflows that were discovered in  RTP codec
payload type handling.  *
http://downloads.digium.com/pub/security/AST-2008-002.pdf  * All users of SIP in
Asterisk 1.4 and 1.6 are affected.    AST-2008-003 details a vulnerability which
allows an attacker to  bypass SIP authentication and to make a call into the
context  specified in the general section of sip.conf.  *
http://downloads.digium.com/pub/security/AST-2008-003.pdf  * All users of SIP in
Asterisk 1.0, 1.2, 1.4, or 1.6 are affected.    AST-2008-005 details a problem
in the way manager IDs are caculated.  *
http://downloads.digium.com/pub/security/AST-2008-005.pdf
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #438127 - CVE-2008-1289 asterisk: Two buffer overflows in RTP Codec Payload Handling (AST-2008-002)
        https://bugzilla.redhat.com/show_bug.cgi?id=438127
  [ 2 ] Bug #438129 - CVE-2008-1332 asterisk: Unauthenticated calls allowed from SIP channel driver (AST-2008-003)
        https://bugzilla.redhat.com/show_bug.cgi?id=438129
  [ 3 ] Bug #438131 - CVE-2008-1390 asterisk: HTTP Manager ID is predictable (AST-2008-005)
        https://bugzilla.redhat.com/show_bug.cgi?id=438131
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update asterisk' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys
--------------------------------------------------------------------------------

_______________________________________________
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2017 E-Soft Inc. All rights reserved.