Debian: New Asterisk packages fix denial of service

    Date26 Jul 2006
    Posted ByLinuxSecurity Advisories
    Updated package.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 1126-1                    This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
    July 27th, 2006               
    - --------------------------------------------------------------------------
    Package        : asterisk
    Vulnerability  : buffer overflow
    Problem type   : remote
    Debian-specific: no
    CVE ID         : CVE-2006-2898
    BugTraq ID     : 18295
    A problem has been discovered in the IAX2 channel driver of Asterisk,
    an Open Source Private Branch Exchange and telephony toolkit, which
    may allow a remote to cause au crash of the Asterisk server.
    The old stable distribution (woody) is not affected by this problem.
    For the stable distribution (sarge) this problem has been fixed in
    version 1.0.7.dfsg.1-2sarge3.
    For the unstable distribution (sid) this problem will be fixed soon.
    We recommend that you upgrade your asterisk packages.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given at the end of this advisory:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
      Source archives:
          Size/MD5 checksum:     1259 cee8373afe6f44b36ea61e04d63b67ca
          Size/MD5 checksum:    70172 5510f5699aee64b06f8d8db4e62ca275
          Size/MD5 checksum:  2929488 0d0f718ccd7a06ab998c3f637df294c0
      Architecture independent components:
          Size/MD5 checksum:    61532 58e631534a5c34740dce182177a3e16b
          Size/MD5 checksum:    83300 92e5c344ae1022fbb8264dfeda02d2c2
          Size/MD5 checksum:  1577638 796103a2c2152b1da96ee557845c4ea0
          Size/MD5 checksum:  1180198 3ffd1657b6ae3824d849107288bfd393
          Size/MD5 checksum:    28290 bd1dca8dcf7dbe19614415d83454534b
      Alpha architecture:
          Size/MD5 checksum:  1477586 e6f5a94ca3b89eb61f2b7cba32532b0f
          Size/MD5 checksum:    31326 76c73e029c258daab79db1c3e2fe87f9
          Size/MD5 checksum:    21354 4f86990f289a85e40b07b83a1bfbbaeb
      AMD64 architecture:
          Size/MD5 checksum:  1333258 39d6b98db096bcf6fa4db45bc578450a
          Size/MD5 checksum:    30738 1b542c9cf1701f3c74250135989a53fc
          Size/MD5 checksum:    21348 162f687406dd17fba17f059310e9669b
      ARM architecture:
          Size/MD5 checksum:  1262736 d88b5f4a1d7a1429f8ffd48da9f46816
          Size/MD5 checksum:    29466 d24a9a1f6f57b1b1b4f5eb3ecb44a70f
          Size/MD5 checksum:    21356 440be66143a663f0698e0236fd92e164
      Intel IA-32 architecture:
          Size/MD5 checksum:  1171422 49ba67f54d8a1bdd331e5f383a0c260f
          Size/MD5 checksum:    29758 6125fda845413e5785dbd5d7c679a392
          Size/MD5 checksum:    21354 f258d72d58eb640660e0efac297edc5f
      Intel IA-64 architecture:
          Size/MD5 checksum:  1771180 cc15c68a1a3551f3c6a3db01572fb872
          Size/MD5 checksum:    32880 683dca0a82cadc16ad38c0c65fce4763
          Size/MD5 checksum:    21354 9d3caf73141a753723050a52c7109047
      HP Precision architecture:
          Size/MD5 checksum:  1448108 4e2074b1ca5ba9dffdda252e0a829ee4
          Size/MD5 checksum:    31384 3f5a1bd65ee55389445b0487eac8c368
          Size/MD5 checksum:    21352 ce35dfb46609b19f617472396e552e72
      Motorola 680x0 architecture:
          Size/MD5 checksum:  1184680 3f73cbf0c391fc41c04d67cfe29e0001
          Size/MD5 checksum:    30130 4e7f290a74e7b682073718e8edc1cc8a
          Size/MD5 checksum:    21356 62ce31ac95d033e589f42a015fddf66b
      Big endian MIPS architecture:
          Size/MD5 checksum:  1263882 52bca4c81f91b8eecb6e557a769e8d64
          Size/MD5 checksum:    29342 b9d7659f65d8a4d6f9fad86073a72b9f
          Size/MD5 checksum:    21354 0a69634f046b529d1b72d49746a138b2
      Little endian MIPS architecture:
          Size/MD5 checksum:  1270240 2aa0c58b551845a4a2a5b07b4660432c
          Size/MD5 checksum:    29276 b3e996a206805436b280aa1c7468a311
          Size/MD5 checksum:    21356 845710e845334fe95bd53b34259fecf3
      PowerPC architecture:
          Size/MD5 checksum:  1425078 29e124b6584659daf5ae62400961b065
          Size/MD5 checksum:    31080 409b172a4b64d79765a9b481c25c43c7
          Size/MD5 checksum:    21356 09f7bab0bc72f03ff52a7ad77614ffd8
      IBM S/390 architecture:
          Size/MD5 checksum:  1312432 de1a22506fd0d5e30be34db44095fc77
          Size/MD5 checksum:    30762 ade33ddd646fca9653a31598df8aa9ce
          Size/MD5 checksum:    21354 63662843c514334226737f60d1b5cab6
      Sun Sparc architecture:
          Size/MD5 checksum:  1274188 3aa3d901a56583bd0ef815761e9bf34d
          Size/MD5 checksum:    29728 71656321b8a63a875d56edb760cbf385
          Size/MD5 checksum:    21350 f96215e4d19ef628a057a8e6dbe9716f
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":54.35,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":10.87,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"16","type":"x","order":"3","pct":34.78,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.