Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.67181
Category:Fedora Local Security Checks
Title:Fedora Core 12 FEDORA-2010-3381 (asterisk)
Summary:NOSUMMARY
Description:Description:
The remote host is missing an update to asterisk
announced via advisory FEDORA-2010-3381.

Update Information:

Update to 1.6.1.17
* AST-2010-003: Invalid parsing of ACL rules can compromise security
* AST-2010-002: This security release is intended to raise awareness of
how it is possible to insert malicious strings into dialplans, and to advise
developers to read the best practices documents so that they may easily avoid
these dangers.
* AST-2010-001: An attacker attempting to negotiate T.38 over SIP can
remotely crash Asterisk by modifying the FaxMaxDatagram field of the SDP to
contain either a negative or exceptionally large value. The same crash occurs
when the FaxMaxDatagram field is omitted from the SDP as well.

References:

[ 1 ] Bug #561332 - CVE-2010-0441 Asterisk: Remote DoS via specially-crafted FaxMaxDatagram SDP packets (AST-2010-001)
https://bugzilla.redhat.com/show_bug.cgi?id=561332

Solution: Apply the appropriate updates.

This update can be installed with the yum update program. Use
su -c 'yum update asterisk' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2010-3381

Risk factor : Medium

CVSS Score:
5.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-4055
BugTraq ID: 37153
http://www.securityfocus.com/bid/37153
Bugtraq: 20091130 AST-2009-010: RTP Remote Crash Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/508147/100/0/threaded
Debian Security Information: DSA-1952 (Google Search)
http://www.debian.org/security/2009/dsa-1952
http://www.redhat.com/archives/fedora-package-announce/2009-December/msg00759.html
http://www.osvdb.org/60569
http://securitytracker.com/id?1023249
http://secunia.com/advisories/37530
http://secunia.com/advisories/37677
http://secunia.com/advisories/37708
http://www.vupen.com/english/advisories/2009/3368
XForce ISS Database: asterisk-rtp-comfortnoise-dos(54471)
https://exchange.xforce.ibmcloud.com/vulnerabilities/54471
Common Vulnerability Exposure (CVE) ID: CVE-2010-0441
BugTraq ID: 38047
http://www.securityfocus.com/bid/38047
Bugtraq: 20100202 AST-2010-001: T.38 Remote Crash Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/509327/100/0/threaded
http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037679.html
http://securitytracker.com/id?1023532
http://secunia.com/advisories/38395
http://secunia.com/advisories/39096
http://www.vupen.com/english/advisories/2010/0289
CopyrightCopyright (c) 2010 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.