Package: asterisk
Version: 1:1.6.2.9-2+squeeze1
Justification: user security hole
Severity: grave
Tags: security patch upstream

The Asterisk project has reported security advisory ASA-2011-002
http://downloads.asterisk.org/pub/security/AST-2011-002.html
(No CVE ATM)

"When decoding UDPTL packets, multiple stack and heap based arrays can
be made to overflow by specially crafted packets. Systems doing T.38
pass through or termination are vulnerable."

Patches were already submitted to the respective branches in the
pkg-voip SVN repo:
http://svn.debian.org/viewsvn/pkg-voip?view=rev&revision=8797 - Squeeze
http://svn.debian.org/viewsvn/pkg-voip?view=rev&revision=8800 - Lenny


Workaround:
As a workaround, in case the patch has not yet been applied, you can
disable the T.38 functionality (versions in Debian stable / oldstable
only have T.38 passthrough capabilities).

* In chan_sip this is only enabled if 't38pt_udptl' wasenabled for a any
  specific peer/user.
* chan_ooh323 (only in stable, not in oldstable. Only needed if you
  installed asterisk-ooh323) needs to be disabled altogether. e.g. set
  in modules.conf in the section [modules]:

    noload => chan_ooh323.so

-- 
Tzafrir Cohen         | tzaf...@jabber.org | VIM is
http://tzafrir.org.il |                    | a Mutt's
tzaf...@cohens.org.il |                    |  best
tzaf...@debian.org    |                    | friend



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to