On Sun, Jul 31, 2005 at 10:48:48PM +0100, Mark Purcell wrote:
> Bug #315532 has been rasied as grave security related bug against 
> asterisk-1.0.7, which is included in the released sarge.

> It refers to a potential overflow in the Asterisk Manager Interface, which is 
> not enabled by default in the Debian asterisk package.  In addition the 
> Debian asterisk package is not run as root as upstream, but rather as the 
> user asterisk with limited privs.

An exploit that results in escalated, non-root privileges is a grave bug (as
opposed to a root escalation bug, which is critical).

> It has been pointed out that a user of the manager interface can execute 
> arbitary commands anyway, so the potential for additional privs is again 
> limited even in the case that the manager interface is enabled and exploited.

But a *limited* potential for privilege escalation is still a potential for
privilege escalation.  If this bug can lead to privilege escalation in a
normal use case for the package, then this ought to be treated as a security
bug.

> My query is does this warrant an release from the security team of the 
> relevant asterisk package?  The patch is included against the bug report.

If the patch is included in the bug report, why would we *not* want the
security team to issue a DSA for it?

-- 
Steve Langasek
postmodern programmer

Attachment: signature.asc
Description: Digital signature

Reply via email to