Mandriva Linux Security Advisory : asterisk (MDVSA-2013:140)

high Nessus Plugin ID 66152

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

Multiple vulnerablilities was identified and fixed in asterisk :

The SIP channel driver in Asterisk Open Source 1.8.x before 1.8.20.2, 10.x before 10.12.2, and 11.x before 11.2.2; Certified Asterisk 1.8.15 before 1.8.15-cert2; Asterisk Business Edition (BE) C.3.x before C.3.8.1; and Asterisk Digiumphones 10.x-digiumphones before 10.12.2-digiumphones exhibits different behavior for invalid INVITE, SUBSCRIBE, and REGISTER transactions depending on whether the user account exists, which allows remote attackers to enumerate account names by (1) reading HTTP status codes, (2) reading additional text in a 403 (aka Forbidden) response, or (3) observing whether certain retransmissions occur (CVE-2013-2264).

Stack-based buffer overflow in res/res_format_attr_h264.c in Asterisk Open Source 11.x before 11.2.2 allows remote attackers to execute arbitrary code via a long sprop-parameter-sets H.264 media attribute in a SIP Session Description Protocol (SDP) header (CVE-2013-2685).

main/http.c in the HTTP server in Asterisk Open Source 1.8.x before 1.8.20.2, 10.x before 10.12.2, and 11.x before 11.2.2; Certified Asterisk 1.8.15 before 1.8.15-cert2; and Asterisk Digiumphones 10.x-digiumphones before 10.12.2-digiumphones does not properly restrict Content-Length values, which allows remote attackers to conduct stack-consumption attacks and cause a denial of service (daemon crash) via a crafted HTTP POST request. NOTE: this vulnerability exists because of an incorrect fix for CVE-2012-5976 (CVE-2013-2686).

The updated packages have upgraded to the 11.2.2 version which is not vulnerable to these issues

Solution

Update the affected packages.

Plugin Details

Severity: High

ID: 66152

File Name: mandriva_MDVSA-2013-140.nasl

Version: 1.11

Type: local

Published: 4/20/2013

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:asterisk, p-cpe:/a:mandriva:linux:asterisk-addons, p-cpe:/a:mandriva:linux:asterisk-devel, p-cpe:/a:mandriva:linux:asterisk-firmware, p-cpe:/a:mandriva:linux:asterisk-plugins-alsa, p-cpe:/a:mandriva:linux:asterisk-plugins-calendar, p-cpe:/a:mandriva:linux:asterisk-plugins-cel, p-cpe:/a:mandriva:linux:asterisk-plugins-corosync, p-cpe:/a:mandriva:linux:asterisk-plugins-curl, p-cpe:/a:mandriva:linux:asterisk-plugins-dahdi, p-cpe:/a:mandriva:linux:asterisk-plugins-fax, p-cpe:/a:mandriva:linux:asterisk-plugins-festival, p-cpe:/a:mandriva:linux:asterisk-plugins-ices, p-cpe:/a:mandriva:linux:asterisk-plugins-jabber, p-cpe:/a:mandriva:linux:asterisk-plugins-jack, p-cpe:/a:mandriva:linux:asterisk-plugins-ldap, p-cpe:/a:mandriva:linux:asterisk-plugins-lua, p-cpe:/a:mandriva:linux:asterisk-plugins-minivm, p-cpe:/a:mandriva:linux:asterisk-plugins-mobile, p-cpe:/a:mandriva:linux:asterisk-plugins-mp3, p-cpe:/a:mandriva:linux:asterisk-plugins-mysql, p-cpe:/a:mandriva:linux:asterisk-plugins-ooh323, p-cpe:/a:mandriva:linux:asterisk-plugins-osp, p-cpe:/a:mandriva:linux:asterisk-plugins-oss, p-cpe:/a:mandriva:linux:asterisk-plugins-pgsql, p-cpe:/a:mandriva:linux:asterisk-plugins-pktccops, p-cpe:/a:mandriva:linux:asterisk-plugins-portaudio, p-cpe:/a:mandriva:linux:asterisk-plugins-radius, p-cpe:/a:mandriva:linux:asterisk-plugins-saycountpl, p-cpe:/a:mandriva:linux:asterisk-plugins-skinny, p-cpe:/a:mandriva:linux:asterisk-plugins-snmp, p-cpe:/a:mandriva:linux:asterisk-plugins-speex, p-cpe:/a:mandriva:linux:asterisk-plugins-sqlite, p-cpe:/a:mandriva:linux:asterisk-plugins-tds, p-cpe:/a:mandriva:linux:asterisk-plugins-unistim, p-cpe:/a:mandriva:linux:asterisk-plugins-voicemail, p-cpe:/a:mandriva:linux:asterisk-plugins-voicemail-imap, p-cpe:/a:mandriva:linux:asterisk-plugins-voicemail-plain, p-cpe:/a:mandriva:linux:lib64asteriskssl1, cpe:/o:mandriva:business_server:1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 4/10/2013

Reference Information

CVE: CVE-2013-2264, CVE-2013-2685, CVE-2013-2686

BID: 58760, 58756, 58764

MDVSA: 2013:140