Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:27763
HistoryMar 18, 2012 - 12:00 a.m.

AST-2012-003: Stack Buffer Overflow in HTTP Manager

2012-03-1800:00:00
vulners.com
26
           Asterisk Project Security Advisory - AST-2012-003

      Product         Asterisk                                            
      Summary         Stack Buffer Overflow in HTTP Manager               
 Nature of Advisory   Exploitable Stack Buffer Overflow                   
   Susceptibility     Remote Unauthenticated Sessions                     
      Severity        Critical                                            
   Exploits Known     No                                                  
    Reported On       03/15/2012                                          
    Reported By       Russell Bryant                                      
     Posted On        03/15/2012                                          
  Last Updated On     March 15, 2012                                      
  Advisory Contact    Matt Jordan < mjordan AT digium DOT com >           
      CVE Name        

Description  An attacker attempting to connect to an HTTP session of the  
             Asterisk Manager Interface can send an arbitrarily long      
             string value for HTTP Digest Authentication. This causes a   
             stack buffer overflow, with the possibility of remote code   
             injection.                                                   

Resolution  Upgrade to one of the versions of Asterisk listed in the      
            "Corrected In" section, or apply a patch specified in the     
            "Patches" section.                                            

                           Affected Versions
            Product              Release Series  
     Asterisk Open Source            1.8.x       All versions             
     Asterisk Open Source             10.x       All versions             

                              Corrected In 
                 Product                              Release             
          Asterisk Open Source                       1.8.10.1             
          Asterisk Open Source                        10.2.1              

                                Patches                          
                            SVN URL                              Revision 

http://downloads.asterisk.org/pub/security/AST-2012-003-1.8.diff v1.8
http://downloads.asterisk.org/pub/security/AST-2012-003-10.diff v10

   Links     https://issues.asterisk.org/jira/browse/ASTERISK-19542       

Asterisk Project Security Advisories are posted at                        
http://www.asterisk.org/security                                          
                                                                          
This document may be superseded by later versions; if so, the latest      
version will be posted at http://downloads.digium.com/pub/security/.pdf   
and http://downloads.digium.com/pub/security/.html                        

                            Revision History
      Date                  Editor                 Revisions Made         
03-15-2012         Matt Jordan               Initial release              

           Asterisk Project Security Advisory - AST-2012-003
          Copyright (c) 2012 Digium, Inc. All Rights Reserved.

Permission is hereby granted to distribute and publish this advisory in its
original, unaltered form.