DSA 1126-1: New Asterisk packages fix denial of service
Posted on: 07/27/2006 09:42 AM

The Debian Security Team published a new security update for Debian GNU/Linux. Here the announcement:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1126-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
July 27th, 2006 http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package : asterisk
Vulnerability : buffer overflow
Problem type : remote
Debian-specific: no
CVE ID : CVE-2006-2898
BugTraq ID : 18295

A problem has been discovered in the IAX2 channel driver of Asterisk,
an Open Source Private Branch Exchange and telephony toolkit, which
may allow a remote to cause au crash of the Asterisk server.

The old stable distribution (woody) is not affected by this problem.

For the stable distribution (sarge) this problem has been fixed in
version 1.0.7.dfsg.1-2sarge3.

For the unstable distribution (sid) this problem will be fixed soon.

We recommend that you upgrade your asterisk packages.


Upgrade Instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given at the end of this advisory:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

Source archives:

http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.0.7.dfsg.1-2sarge3.dsc
Size/MD5 checksum: 1259 cee8373afe6f44b36ea61e04d63b67ca
http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.0.7.dfsg.1-2sarge3.diff.gz
Size/MD5 checksum: 70172 5510f5699aee64b06f8d8db4e62ca275
http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.0.7.dfsg.1.orig.tar.gz
Size/MD5 checksum: 2929488 0d0f718ccd7a06ab998c3f637df294c0

Architecture independent components:

http://security.debian.org/pool/updates/main/a/asterisk/asterisk-config_1.0.7.dfsg.1-2sarge3_all.deb
Size/MD5 checksum: 61532 58e631534a5c34740dce182177a3e16b
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-dev_1.0.7.dfsg.1-2sarge3_all.deb
Size/MD5 checksum: 83300 92e5c344ae1022fbb8264dfeda02d2c2
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-doc_1.0.7.dfsg.1-2sarge3_all.deb
Size/MD5 checksum: 1577638 796103a2c2152b1da96ee557845c4ea0
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-sounds-main_1.0.7.dfsg.1-2sarge3_all.deb
Size/MD5 checksum: 1180198 3ffd1657b6ae3824d849107288bfd393
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-web-vmail_1.0.7.dfsg.1-2sarge3_all.deb
Size/MD5 checksum: 28290 bd1dca8dcf7dbe19614415d83454534b

Alpha architecture:

http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.0.7.dfsg.1-2sarge3_alpha.deb
Size/MD5 checksum: 1477586 e6f5a94ca3b89eb61f2b7cba32532b0f
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-gtk-console_1.0.7.dfsg.1-2sarge3_alpha.deb
Size/MD5 checksum: 31326 76c73e029c258daab79db1c3e2fe87f9
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.0.7.dfsg.1-2sarge3_alpha.deb
Size/MD5 checksum: 21354 4f86990f289a85e40b07b83a1bfbbaeb

AMD64 architecture:

http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.0.7.dfsg.1-2sarge3_amd64.deb
Size/MD5 checksum: 1333258 39d6b98db096bcf6fa4db45bc578450a
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-gtk-console_1.0.7.dfsg.1-2sarge3_amd64.deb
Size/MD5 checksum: 30738 1b542c9cf1701f3c74250135989a53fc
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.0.7.dfsg.1-2sarge3_amd64.deb
Size/MD5 checksum: 21348 162f687406dd17fba17f059310e9669b

ARM architecture:

http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.0.7.dfsg.1-2sarge3_arm.deb
Size/MD5 checksum: 1262736 d88b5f4a1d7a1429f8ffd48da9f46816
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-gtk-console_1.0.7.dfsg.1-2sarge3_arm.deb
Size/MD5 checksum: 29466 d24a9a1f6f57b1b1b4f5eb3ecb44a70f
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.0.7.dfsg.1-2sarge3_arm.deb
Size/MD5 checksum: 21356 440be66143a663f0698e0236fd92e164

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.0.7.dfsg.1-2sarge3_i386.deb
Size/MD5 checksum: 1171422 49ba67f54d8a1bdd331e5f383a0c260f
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-gtk-console_1.0.7.dfsg.1-2sarge3_i386.deb
Size/MD5 checksum: 29758 6125fda845413e5785dbd5d7c679a392
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.0.7.dfsg.1-2sarge3_i386.deb
Size/MD5 checksum: 21354 f258d72d58eb640660e0efac297edc5f

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.0.7.dfsg.1-2sarge3_ia64.deb
Size/MD5 checksum: 1771180 cc15c68a1a3551f3c6a3db01572fb872
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-gtk-console_1.0.7.dfsg.1-2sarge3_ia64.deb
Size/MD5 checksum: 32880 683dca0a82cadc16ad38c0c65fce4763
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.0.7.dfsg.1-2sarge3_ia64.deb
Size/MD5 checksum: 21354 9d3caf73141a753723050a52c7109047

HP Precision architecture:

http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.0.7.dfsg.1-2sarge3_hppa.deb
Size/MD5 checksum: 1448108 4e2074b1ca5ba9dffdda252e0a829ee4
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-gtk-console_1.0.7.dfsg.1-2sarge3_hppa.deb
Size/MD5 checksum: 31384 3f5a1bd65ee55389445b0487eac8c368
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.0.7.dfsg.1-2sarge3_hppa.deb
Size/MD5 checksum: 21352 ce35dfb46609b19f617472396e552e72

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.0.7.dfsg.1-2sarge3_m68k.deb
Size/MD5 checksum: 1184680 3f73cbf0c391fc41c04d67cfe29e0001
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-gtk-console_1.0.7.dfsg.1-2sarge3_m68k.deb
Size/MD5 checksum: 30130 4e7f290a74e7b682073718e8edc1cc8a
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.0.7.dfsg.1-2sarge3_m68k.deb
Size/MD5 checksum: 21356 62ce31ac95d033e589f42a015fddf66b

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.0.7.dfsg.1-2sarge3_mips.deb
Size/MD5 checksum: 1263882 52bca4c81f91b8eecb6e557a769e8d64
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-gtk-console_1.0.7.dfsg.1-2sarge3_mips.deb
Size/MD5 checksum: 29342 b9d7659f65d8a4d6f9fad86073a72b9f
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.0.7.dfsg.1-2sarge3_mips.deb
Size/MD5 checksum: 21354 0a69634f046b529d1b72d49746a138b2

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.0.7.dfsg.1-2sarge3_mipsel.deb
Size/MD5 checksum: 1270240 2aa0c58b551845a4a2a5b07b4660432c
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-gtk-console_1.0.7.dfsg.1-2sarge3_mipsel.deb
Size/MD5 checksum: 29276 b3e996a206805436b280aa1c7468a311
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.0.7.dfsg.1-2sarge3_mipsel.deb
Size/MD5 checksum: 21356 845710e845334fe95bd53b34259fecf3

PowerPC architecture:

http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.0.7.dfsg.1-2sarge3_powerpc.deb
Size/MD5 checksum: 1425078 29e124b6584659daf5ae62400961b065
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-gtk-console_1.0.7.dfsg.1-2sarge3_powerpc.deb
Size/MD5 checksum: 31080 409b172a4b64d79765a9b481c25c43c7
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.0.7.dfsg.1-2sarge3_powerpc.deb
Size/MD5 checksum: 21356 09f7bab0bc72f03ff52a7ad77614ffd8

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.0.7.dfsg.1-2sarge3_s390.deb
Size/MD5 checksum: 1312432 de1a22506fd0d5e30be34db44095fc77
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-gtk-console_1.0.7.dfsg.1-2sarge3_s390.deb
Size/MD5 checksum: 30762 ade33ddd646fca9653a31598df8aa9ce
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.0.7.dfsg.1-2sarge3_s390.deb
Size/MD5 checksum: 21354 63662843c514334226737f60d1b5cab6

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.0.7.dfsg.1-2sarge3_sparc.deb
Size/MD5 checksum: 1274188 3aa3d901a56583bd0ef815761e9bf34d
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-gtk-console_1.0.7.dfsg.1-2sarge3_sparc.deb
Size/MD5 checksum: 29728 71656321b8a63a875d56edb760cbf385
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.0.7.dfsg.1-2sarge3_sparc.deb
Size/MD5 checksum: 21350 f96215e4d19ef628a057a8e6dbe9716f


These files will probably be moved into the stable distribution on
its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show lt;pkggt;' and http://packages.debian.org/lt;pkggt;

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEyF30W5ql+IAeqTIRAt5iAJ9her05bPSniUNcdqt59KAEPyWm8QCfRrLj
otLHweSY1Rj4tweUJV4e1Rs=
=pbKB
-----END PGP SIGNATURE-----



Printed from Linux Compatible (http://www.linuxcompatible.org/news/story/dsa_1126_1_new_asterisk_packages_fix_denial_of_service.html)