Home / vulnerabilities Debian Security Advisory 3535-1
Posted on 30 March 2016
Source : packetstormsecurity.org Link
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3535-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
March 29, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : kamailio
CVE ID : CVE-2016-2385
Stelios Tsampas discovered a buffer overflow in the Kamailio SIP proxy
which might result in the execution of arbitrary code.
For the stable distribution (jessie), this problem has been fixed in
version 4.2.0-2+deb8u1.
For the testing distribution (stretch), this problem has been fixed
in version 4.3.4-2.
For the unstable distribution (sid), this problem has been fixed in
version 4.3.4-2.
We recommend that you upgrade your kamailio packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2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=BijT
-----END PGP SIGNATURE-----