Package : asterisk Vulnerability : several Problem-Type : remote Debian-specific: no CVE ID : CVE-2007-1306 CVE-2007-1561 CVE-2007-2294 CVE-2007-2297 CVE-2007-2488 CVE-2007-3762 CVE-2007-3763 CVE-2007-3764
Several remote vulnerabilities have been discovered in Asterisk, a free software PBX and telephony toolkit. The Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2007-1306
"Mu Security" discovered that a NULL pointer deference in the SIP implementation could lead to denial of service.
CVE-2007-1561
Inria Lorraine discovered that a programming error in the SIP implementation could lead to denial of service.
CVE-2007-2294
It was discovered that a NULL pointer deference in the manager interface could lead to denial of service.
CVE-2007-2297
It was discovered that a programming error in the SIP implementation could lead to denial of service.
CVE-2007-2488
Tim Panton and Birgit Arkestein discovered that a programming error in the IAX2 implementation could lead to information disclosure.
CVE-2007-3762
Russell Bryant discovered that a buffer overflow in the IAX implementation could lead to the execution of arbitrary code.
CVE-2007-3763
Chris Clark and Zane Lackey discovered that several NULL pointer deferences in the IAX2 implementation could lead to denial of service.
CVE-2007-3764
Will Drewry discovered that a programming error in the Skinny implementation could lead to denial of service.
For the oldstable distribution (sarge) these problems have been fixed in version 1.0.7.dfsg.1-2sarge5.
For the stable distribution (etch) these problems have been fixed in version 1:1.2.13~dfsg-2etch1.
For the unstable distribution (sid) these problems have been fixed in version 1:1.4.11~dfsg-1.
We recommend that you upgrade your Asterisk packages.
Upgrade Instructions - --------------------
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 3.1 alias sarge - --------------------------------