drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Asterisk
Name: |
Mehrere Probleme in Asterisk |
|
ID: |
201412-51 |
|
Distribution: |
Gentoo |
|
Plattformen: |
Keine Angabe |
|
Datum: |
Mo, 29. Dezember 2014, 08:26 |
|
Referenzen: |
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8412
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8414
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8417
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8418
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9374 |
|
Applikationen: |
Asterisk |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --MKhAcLsB4e6i3rd8G4FiHQqBGi511dnMb Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201412-51 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal Title: Asterisk: Multiple vulnerabilities Date: December 28, 2014 Bugs: #530056, #532242 ID: 201412-51
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis ========
Multiple vulnerabilities have been found in Asterisk, the worst of which could lead to Denial of Service, bypass intended ACL restrictions or allow an authenticated user to gain escalated privileges.
Background ==========
Asterisk is an open source telephony engine and toolkit.
Affected packages =================
------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-misc/asterisk < 11.14.2 >= 11.14.2
Description ===========
Multiple unspecified vulnerabilities have been discovered in Asterisk. Please review the CVE identifiers referenced below for details.
Impact ======
Unauthenticated remote attackers can cause Denial of Service or bypass intended ACL restrictions. Authenticated remote attackers can gain escalated privileges.
Workaround ==========
There is no known workaround at this time.
Resolution ==========
All asterisk users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/asterisk-11.14.2"
References ==========
[ 1 ] CVE-2014-8412 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8412 [ 2 ] CVE-2014-8414 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8414 [ 3 ] CVE-2014-8417 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8417 [ 4 ] CVE-2014-8418 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8418 [ 5 ] CVE-2014-9374 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9374
Availability ============
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201412-51.xml
Concerns? =========
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License =======
Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
--MKhAcLsB4e6i3rd8G4FiHQqBGi511dnMb Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQIcBAEBCgAGBQJUoE7UAAoJEPw7F94F4Tag34kP/2WSJmZZlbJoBPNxrQyXnP2V 2LYf76qyThQqQJnhDpTSEcYl45nQ0xFck6jGuJltz0RYI2gfBro2oIsP2C6aCbf1 1nJYw5NumaXFrtrXck4edRzbHRT9vGAkRkvBiP9P5mCO/0sTJNxmgYyV5YdYr0uy H7/u60rDrspp+9AaVxxw1io4LfPQGXidnjAhbFVPrLxKpVcVrxyis1MaM4QG/nZS UYG+gO/MXUYnJfQf3wZS+d6HycwF3MG7vFKCUHcAb81FyFTAiamSfoccNQwN1QIy h8QUnTRp0YHWlpw+nsQgocVnBPHFJ45W0Dcj7jHpj4ZKLHi+aSCSOSKczBfleDjQ 84qbzuKdnMz2Xat9JO1M4cJhGMLUKt2MXraX+MI/6WDh5wimYCTQYOJS1LGWdnJQ 5FHTV9+K9r3ilnPnsFYiAcnPm4PvnvvfftxJ9XYlFtQ+RMmb/NWk1V+ug5ZJkh4z ZD791mOKxAp+B7IF/2tApBx1ZB4HyDU7DwrovTprtns/1yKJCM4AtiRlaYdVuKbw CvxT0umFKgGnspJsS38EzWruz2v90tKD+6w33/WihC2P7+9HcPfB8f6ayaHeHvbI bhdsJACqv2jhkV6JoXjPXUI5eN/wE2IHuysy4t+XifZEOr4edkaQHx9fGlqqsM27 pG1AScXXT+/LMsMhnr0o =E+gR -----END PGP SIGNATURE-----
--MKhAcLsB4e6i3rd8G4FiHQqBGi511dnMb--
|
|
|
|