Thursday, October 19, 2006

Asterisk Security Advisory

OpenPKG Security Advisory - asterisk (OpenPKG-SA-2006.024 )
________________________________________________________________________
OpenPKG Security Advisory OpenPKG GmbH
http://www.openpkg.org/security/ http://openpkg.com
OpenPKG-SA-2006.024 2006-10-19
________________________________________________________________________
Package: asterisk
Vulnerability: arbitrary code execution
OpenPKG Specific: no
Affected Series: Affected Packages: Corrected Packages:
1.0-ENTERPRISE n.a. >= asterisk-1.2.13-E1.0.0
2-STABLE-20061018 <= asterisk-1.2.12.1-2.20061018 >=
asterisk-1.2.13-2.20061019
2-STABLE <= asterisk-1.2.12.1-2.20061018 >=
asterisk-1.2.13-2.20061019
CURRENT <= asterisk-1.2.12.1-20061015 >= asterisk-1.2.13-20061019
Description:
According to a vendor security advisory [1], a vulnerability exists
in the Asterisk Private Branch Exchange (PBX) software [2]. This
vulnerability would enable an attacker to remotely execute code as
the user Asterisk is running under. It is not required that the
"skinny.conf" file contains any valid phone entries, only that the
"chan_skinny" module is loaded and operational (but which is not the
default in OpenPKG's default Asterisk configuration).
________________________________________________________________________
References:
[1] http://www.asterisk.org/node/109
[2] http://www.asterisk.org/
________________________________________________________________________
For security reasons, this advisory was digitally signed with the
OpenPGP public key "OpenPKG " (ID 63C4CB9F) which
you can retrieve from http://www.openpkg.org/openpkg.pgp. Follow the
instructions on http://www.openpkg.org/security/signatures/ for details
on how to verify the integrity of this advisory.
________________________________________________________________________

0 Comments:

Post a Comment

<< Home