Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Asterisk
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Asterisk
ID: 201412-51
Distribution: Gentoo
Plattformen: Keine Angabe
Datum: Mo, 29. Dezember 2014, 08:26
Referenzen: http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8412
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8414
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8417
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8418
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9374
Applikationen: Asterisk

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--MKhAcLsB4e6i3rd8G4FiHQqBGi511dnMb
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201412-51
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: Normal
Title: Asterisk: Multiple vulnerabilities
Date: December 28, 2014
Bugs: #530056, #532242
ID: 201412-51

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Multiple vulnerabilities have been found in Asterisk, the worst of
which could lead to Denial of Service, bypass intended ACL restrictions
or allow an authenticated user to gain escalated privileges.

Background
==========

Asterisk is an open source telephony engine and toolkit.

Affected packages
=================

-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-misc/asterisk < 11.14.2 >= 11.14.2

Description
===========

Multiple unspecified vulnerabilities have been discovered in Asterisk.
Please review the CVE identifiers referenced below for details.

Impact
======

Unauthenticated remote attackers can cause Denial of Service or bypass
intended ACL restrictions. Authenticated remote attackers can gain
escalated privileges.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All asterisk users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/asterisk-11.14.2"

References
==========

[ 1 ] CVE-2014-8412
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8412
[ 2 ] CVE-2014-8414
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8414
[ 3 ] CVE-2014-8417
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8417
[ 4 ] CVE-2014-8418
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8418
[ 5 ] CVE-2014-9374
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9374

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-201412-51.xml

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


--MKhAcLsB4e6i3rd8G4FiHQqBGi511dnMb
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJUoE7UAAoJEPw7F94F4Tag34kP/2WSJmZZlbJoBPNxrQyXnP2V
2LYf76qyThQqQJnhDpTSEcYl45nQ0xFck6jGuJltz0RYI2gfBro2oIsP2C6aCbf1
1nJYw5NumaXFrtrXck4edRzbHRT9vGAkRkvBiP9P5mCO/0sTJNxmgYyV5YdYr0uy
H7/u60rDrspp+9AaVxxw1io4LfPQGXidnjAhbFVPrLxKpVcVrxyis1MaM4QG/nZS
UYG+gO/MXUYnJfQf3wZS+d6HycwF3MG7vFKCUHcAb81FyFTAiamSfoccNQwN1QIy
h8QUnTRp0YHWlpw+nsQgocVnBPHFJ45W0Dcj7jHpj4ZKLHi+aSCSOSKczBfleDjQ
84qbzuKdnMz2Xat9JO1M4cJhGMLUKt2MXraX+MI/6WDh5wimYCTQYOJS1LGWdnJQ
5FHTV9+K9r3ilnPnsFYiAcnPm4PvnvvfftxJ9XYlFtQ+RMmb/NWk1V+ug5ZJkh4z
ZD791mOKxAp+B7IF/2tApBx1ZB4HyDU7DwrovTprtns/1yKJCM4AtiRlaYdVuKbw
CvxT0umFKgGnspJsS38EzWruz2v90tKD+6w33/WihC2P7+9HcPfB8f6ayaHeHvbI
bhdsJACqv2jhkV6JoXjPXUI5eN/wE2IHuysy4t+XifZEOr4edkaQHx9fGlqqsM27
pG1AScXXT+/LMsMhnr0o
=E+gR
-----END PGP SIGNATURE-----

--MKhAcLsB4e6i3rd8G4FiHQqBGi511dnMb--
Pro-Linux
Gewinnspiel
Neue Nachrichten
Werbung