[SECURITY] Fedora 12 Update: asterisk-1.6.1.17-1.fc12

updates at fedoraproject.org updates at fedoraproject.org
Thu Apr 1 01:38:49 UTC 2010


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2010-3381
2010-03-03 01:36:19
--------------------------------------------------------------------------------

Name        : asterisk
Product     : Fedora 12
Version     : 1.6.1.17
Release     : 1.fc12
URL         : http://www.asterisk.org/
Summary     : The Open Source PBX
Description :
Asterisk is a complete PBX in software. It runs on Linux and provides
all of the features you would expect from a PBX and more. Asterisk
does voice over IP in three protocols, and can interoperate with
almost all standards-based telephony equipment using relatively
inexpensive hardware.

--------------------------------------------------------------------------------
Update Information:

Update to 1.6.1.17 * AST-2010-003: Invalid parsing of ACL rules can compromise
security * AST-2010-002: This security release is intended to raise awareness of
how it is possible to insert malicious strings into dialplans, and to advise
developers to read the best practices documents so that they may easily avoid
these dangers. * AST-2010-001: An attacker attempting to negotiate T.38 over SIP
can remotely crash Asterisk by modifying the FaxMaxDatagram field of the SDP to
contain either a negative or exceptionally large value. The same crash occurs
when the FaxMaxDatagram field is omitted from the SDP as well.
--------------------------------------------------------------------------------
ChangeLog:

* Mon Mar  1 2010 Jeffrey C. Ollie <jeff at ocjtech.us> - 1.6.1.17-1
- Update to 1.6.1.17
- 
- * AST-2010-003: Invalid parsing of ACL rules can compromise security
- * AST-2010-002: This security release is intended to raise awareness
-   of how it is possible to insert malicious strings into dialplans,
-   and to advise developers to read the best practices documents so
-   that they may easily avoid these dangers.
- * AST-2010-001: An attacker attempting to negotiate T.38 over SIP can
-   remotely crash Asterisk by modifying the FaxMaxDatagram field of 
-   the SDP to contain either a negative or exceptionally large value.
-   The same crash occurs when the FaxMaxDatagram field is omitted from 
-   the SDP as well.
* Mon Dec 21 2009 Jeffrey C. Ollie <jeff at ocjtech.us> - 1.6.1.12-1
- Update to 1.6.1.12
* Mon Nov 30 2009 Jeffrey C. Ollie <jeff at ocjtech.us> - 1.6.1.11-1
- Update to 1.6.1.11 to fix AST-2009-010/CVE-2009-4055
* Thu Nov 19 2009 Jeffrey C. Ollie <jeff at ocjtech.us> - 1.6.1.10-1
- Update to 1.6.1.10
- Drop unneeded patch to get Lua extensions building
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #561332 - CVE-2010-0441 Asterisk: Remote DoS via specially-crafted FaxMaxDatagram SDP packets (AST-2010-001)
        https://bugzilla.redhat.com/show_bug.cgi?id=561332
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update asterisk' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


More information about the package-announce mailing list