Home / vulnerabilities AST-2007-024.txt
Posted on 09 November 2007
Source : packetstormsecurity.org Link
Asterisk Project Security Advisory - AST-2007-024
+------------------------------------------------------------------------+
| Product | Zaptel |
|--------------------+---------------------------------------------------|
| Summary | Potential buffer overflow from command line |
| | application "sethdlc" |
|--------------------+---------------------------------------------------|
| Nature of Advisory | Buffer overflow |
|--------------------+---------------------------------------------------|
| Susceptibility | Local sessions |
|--------------------+---------------------------------------------------|
| Severity | None |
|--------------------+---------------------------------------------------|
| Exploits Known | None |
|--------------------+---------------------------------------------------|
| Reported On | October 31, 2007 |
|--------------------+---------------------------------------------------|
| Reported By | Michael Bucko <michael DOT bucko AT eleytt DOT |
| | com> |
|--------------------+---------------------------------------------------|
| Posted On | October 31, 2007 |
|--------------------+---------------------------------------------------|
| Last Updated On | November 1, 2007 |
|--------------------+---------------------------------------------------|
| Advisory Contact | Mark Michelson <mmichelson AT digium DOT com> |
|--------------------+---------------------------------------------------|
| CVE Name | CVE-2007-5690 |
+------------------------------------------------------------------------+
+------------------------------------------------------------------------+
| Description | This advisory is a response to a false security |
| | vulnerability published in several places on the |
| | Internet. Had Asterisk's developers been notified prior |
| | to its publication, there would be no need for this. |
| | |
| | There is a potential for a buffer overflow in the |
| | sethdlc application; however, running this application |
| | requires root access to the server, which means that |
| | exploiting this vulnerability gains the attacker no more |
| | advantage than what he already has. As such, this is a |
| | bug, not a security vulnerability. |
+------------------------------------------------------------------------+
+------------------------------------------------------------------------+
| Resolution | The copy of the user-provided argument to the buffer has |
| | been limited to the length of the buffer. This fix has |
| | been committed to the Zaptel 1.2 and 1.4 repositories, |
| | but due to the lack of severity, new releases will not be |
| | immediately made. |
| | |
| | While we appreciate this programming error being brought |
| | to our attention, we would encourage security researchers |
| | to contact us prior to releasing any reports of their |
| | own, both so that we can fix any vulnerability found |
| | prior to the release of an announcement, as well as |
| | avoiding these types of mistakes (and the potential |
| | embarrassment of reporting a vulnerability that wasn't) |
| | in the future. |
+------------------------------------------------------------------------+
+------------------------------------------------------------------------+
| Affected Versions |
|------------------------------------------------------------------------|
| Product | Release Series | |
|-----------------+----------------+-------------------------------------|
| Zaptel | 1.2.x | All versions prior to 1.2.22 |
|-----------------+----------------+-------------------------------------|
| Zaptel | 1.4.x | All versions prior to 1.4.7 |
+------------------------------------------------------------------------+
+------------------------------------------------------------------------+
| Corrected In |
|------------------------------------------------------------------------|
| Product | Release |
|----------------------------+-------------------------------------------|
| Zaptel | 1.2.22, when available |
|----------------------------+-------------------------------------------|
| Zaptel | 1.4.7, when available |
|----------------------------+-------------------------------------------|
+------------------------------------------------------------------------+
+------------------------------------------------------------------------+
|Links |http://archives.neohapsis.com/archives/bugtraq/2007-10/0316.html |
+------------------------------------------------------------------------+
+------------------------------------------------------------------------+
| Asterisk Project Security Advisories are posted at |
| http://www.asterisk.org/security. |
| |
| This document may be superseded by later versions; if so, the latest |
| version will be posted at |
| http://downloads.digium.com/pub/security/AST-2007-024.pdf and |
| http://downloads.digium.com/pub/security/AST-2007-024.html. |
+------------------------------------------------------------------------+
+------------------------------------------------------------------------+
| Revision History |
|------------------------------------------------------------------------|
| Date | Editor | Revisions Made |
|------------+----------------+------------------------------------------|
| 10/31/2007 | Mark Michelson | Initial release |
|------------+----------------+------------------------------------------|
| 10/31/2007 | Mark Michelson | Changed severity, description, and |
| | | resolution |
+------------------------------------------------------------------------+
Asterisk Project Security Advisory - AST-2007-024
Copyright (c) 2007 Digium, Inc. All Rights Reserved.
Permission is hereby granted to distribute and publish this advisory in its
original, unaltered form.