CVE-2011-0495: AST-2011-001: Asterisk: Stack based buffer overflow by forming an outgoing SIP request with specially-crafted caller ID information

Bug #705014 reported by Darik Horn
258
This bug affects 1 person
Affects Status Importance Assigned to Milestone
asterisk (Debian)
Fix Released
Unknown
asterisk (Ubuntu)
Fix Released
Medium
Unassigned
Declined for Dapper by Jamie Strandboge
Hardy
Won't Fix
Medium
Unassigned
Karmic
Won't Fix
Medium
Unassigned
Lucid
Fix Released
Medium
Unassigned
Maverick
Fix Released
Medium
Unassigned
Natty
Fix Released
Medium
Unassigned

Bug Description

Binary package hint: asterisk

All of the Asterisk packages in Ubuntu need to be patched for AST-2011-001, which is tentatively CVE-2011-0495.

See: http://downloads.asterisk.org/pub/security/AST-2011-001.html

Although Asterisk in currently in the universe repository, it would nevertheless be appreciated to get the security fix. Debian already has the fix pending in their pkg-voip tree.

Related branches

CVE References

Darik Horn (dajhorn)
visibility: private → public
summary: - CVS-2011-0495: AST-2011-001: Asterisk: Stack based buffer overflow by
+ CVE-2011-0495: AST-2011-001: Asterisk: Stack based buffer overflow by
forming an outgoing SIP request with specially-crafted caller ID
information
description: updated
Dave Walker (davewalker)
Changed in asterisk (Ubuntu):
status: New → Confirmed
Revision history for this message
Paul Belanger (pabelanger) wrote :

Slightly on topic, do you mind outputting the bzr commands you used to branch from lp:ubuntu/asterisk to lp:~davewalker/ubuntu/natty/asterisk/lp_705014? I started work patches this morning, but got bogged down in bzr.

Additionally, it don't look like we have an up-to-date branch for asterisk packages using bzr-buildpackage, unless I'm missing something.

Changed in asterisk (Debian):
status: Unknown → Confirmed
Revision history for this message
Dave Walker (davewalker) wrote :

Hi Paul,

It's probably better to join freenode IRC, #ubuntu-devel, or #ubuntu-motu. My IRC nick is Daviey, i am happy to help.

Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Dapper is EOL for everything except a subset of main and restricted packages right now, so I am going to decline the Dapper task unless someone wants to provide a patch and the testing.

Changed in asterisk (Ubuntu Lucid):
status: New → Confirmed
importance: Undecided → Medium
Changed in asterisk (Ubuntu Maverick):
status: New → Confirmed
importance: Undecided → Medium
Changed in asterisk (Ubuntu Natty):
importance: Undecided → Medium
Changed in asterisk (Ubuntu Hardy):
status: New → Confirmed
importance: Undecided → Medium
Changed in asterisk (Ubuntu Karmic):
status: New → Confirmed
importance: Undecided → Medium
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package asterisk - 1:1.6.2.9-2ubuntu2

---------------
asterisk (1:1.6.2.9-2ubuntu2) natty; urgency=low

  * SECURITY UPDATE: Stack buffer overflow in SIP channel driver. (LP: #705014)
    - debian/patches/AST-2011-001-1.6.2: The size of the output buffer passed
      to the ast_uri_encode function is now properly respected in main/utils.c.
      Patch courtesy of upstream.
    - CVE-2011-0495
 -- Dave Walker (Daviey) <email address hidden> Thu, 20 Jan 2011 21:19:46 +0000

Changed in asterisk (Ubuntu Natty):
status: Confirmed → Fix Released
Changed in asterisk (Ubuntu Hardy):
status: Confirmed → Triaged
Changed in asterisk (Ubuntu Karmic):
status: Confirmed → Triaged
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Uploaded maverick/1:1.6.2.7-1ubuntu1.1 to the security PPA.

Changed in asterisk (Ubuntu Maverick):
status: Confirmed → Fix Committed
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Uploaded lucid/1:1.6.2.5-0ubuntu1.3 to the security PPA.

Changed in asterisk (Ubuntu Lucid):
status: Confirmed → Fix Committed
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package asterisk - 1:1.6.2.7-1ubuntu1.1

---------------
asterisk (1:1.6.2.7-1ubuntu1.1) maverick-security; urgency=low

  * SECURITY UPDATE: Stack buffer overflow in SIP channel driver. (LP: #705014)
    - debian/patches/AST-2011-001-1.6.2: The size of the output buffer passed
      to the ast_uri_encode function is now properly respected in main/utils.c.
      Patch courtesy of upstream.
    - CVE-2011-0495
 -- Dave Walker (Daviey) <email address hidden> Thu, 20 Jan 2011 23:36:57 +0000

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package asterisk - 1:1.6.2.5-0ubuntu1.3

---------------
asterisk (1:1.6.2.5-0ubuntu1.3) lucid-security; urgency=low

  * SECURITY UPDATE: Stack buffer overflow in SIP channel driver. (LP: #705014)
    - debian/patches/AST-2011-001-1.6.2: The size of the output buffer passed
      to the ast_uri_encode function is now properly respected in main/utils.c.
      Patch courtesy of upstream.
    - CVE-2011-0495
 -- Dave Walker (Daviey) <email address hidden> Thu, 20 Jan 2011 23:31:55 +0000

Changed in asterisk (Ubuntu Lucid):
status: Fix Committed → Fix Released
Changed in asterisk (Ubuntu Maverick):
status: Fix Committed → Fix Released
Changed in asterisk (Debian):
status: Confirmed → Fix Released
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Thank you for reporting this bug to Ubuntu. karmic has reached EOL
(End of Life) and is no longer supported. As a result, this bug
against karmic is being marked "Won't Fix". Please see
https://wiki.ubuntu.com/Releases for currently supported Ubuntu
releases.

Please feel free to report any other bugs you may find.

Changed in asterisk (Ubuntu Karmic):
status: Triaged → Won't Fix
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Thank you for reporting this bug and helping to make Ubuntu better. The package referred to in this bug is in universe or multiverse and reported against a release of Ubuntu (hardy) which no longer receives updates outside of the explicitly supported LTS packages. While the bug against hardy is being marked "Won't Fix" for now, if you are interested feel free to post a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures'

Please feel free to report any other bugs you may find.

Changed in asterisk (Ubuntu Hardy):
status: Triaged → Won't Fix
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.