Description: | Description:
The remote host is missing an update to asterisk announced via advisory FEDORA-2008-2620.
Update Information:
Update to 1.4.18.1 plus another patch to fix some security issues. AST-2008-002 details two buffer overflows that were discovered in RTP codec payload type handling. * http://downloads.digium.com/pub/security/AST-2008-002.pdf * All users of SIP in Asterisk 1.4 and 1.6 are affected. AST-2008-003 details a vulnerability which allows an attacker to bypass SIP authentication and to make a call into the context specified in the general section of sip.conf. * http://downloads.digium.com/pub/security/AST-2008-003.pdf * All users of SIP in Asterisk 1.0, 1.2, 1.4, or 1.6 are affected. AST-2008-005 details a problem in the way manager IDs are caculated. * http://downloads.digium.com/pub/security/AST-2008-005.pdf
References:
[ 1 ] Bug #438127 - CVE-2008-1289 asterisk: Two buffer overflows in RTP Codec Payload Handling (AST-2008-002) https://bugzilla.redhat.com/show_bug.cgi?id=438127 [ 2 ] Bug #438129 - CVE-2008-1332 asterisk: Unauthenticated calls allowed from SIP channel driver (AST-2008-003) https://bugzilla.redhat.com/show_bug.cgi?id=438129 [ 3 ] Bug #438131 - CVE-2008-1390 asterisk: HTTP Manager ID is predictable (AST-2008-005) https://bugzilla.redhat.com/show_bug.cgi?id=438131
Solution: Apply the appropriate updates.
This update can be installed with the yum update program. Use su -c 'yum update asterisk' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/.
http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2008-2620
Risk factor : Critical
CVSS Score: 9.3
|