aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorflo <flo@FreeBSD.org>2011-01-19 16:46:28 +0800
committerflo <flo@FreeBSD.org>2011-01-19 16:46:28 +0800
commitc0b012a8a4b7a916703a6b8f210170e50963fc16 (patch)
tree984a9ebf5698c660432187087a7cf105f030b096
parenta91be60e7ad8276e1979dabe6cb608437a852d10 (diff)
downloadfreebsd-ports-gnome-c0b012a8a4b7a916703a6b8f210170e50963fc16.tar.gz
freebsd-ports-gnome-c0b012a8a4b7a916703a6b8f210170e50963fc16.tar.zst
freebsd-ports-gnome-c0b012a8a4b7a916703a6b8f210170e50963fc16.zip
- Document Exploitable Stack Buffer Overflow in asterisk
Approved by: fjoe (mentor) Feature safe: yes
-rw-r--r--security/vuxml/vuln.xml39
1 files changed, 39 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index e4d0ac826b30..15005b79e56a 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,45 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="5ab9fb2a-23a5-11e0-a835-0003ba02bf30">
+ <topic>asterisk -- Exploitable Stack Buffer Overflow</topic>
+ <affects>
+ <package>
+ <name>asterisk14</name>
+ <range><gt>1.4.*</gt><lt>1.4.39.1</lt></range>
+ </package>
+ <package>
+ <name>asterisk16</name>
+ <range><gt>1.6.*</gt><lt>1.6.16.1</lt></range>
+ </package>
+ <package>
+ <name>asterisk18</name>
+ <range><gt>1.8.*</gt><lt>1.8.2.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Asterisk Development Team reports:</p>
+ <blockquote cite="http://lists.digium.com/pipermail/asterisk-announce/2011-January/000297.html">
+ <p>The releases of Asterisk 1.4.38.1, 1.4.39.1, 1.6.1.21, 1.6.2.15.1,
+ 1.6.2.16.2, 1.8.1.2, and 1.8.2.1 resolve an issue when forming an
+ outgoing SIP request while in pedantic mode, which can cause a stack
+ buffer to be made to overflow if supplied with carefully crafted
+ caller ID information. The issue and resolution are described in the
+ AST-2011-001 security advisory.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://downloads.asterisk.org/pub/security/AST-2011-001.pdf</url>
+ </references>
+ <dates>
+ <discovery>2011-01-18</discovery>
+ <entry>2011-01-19</entry>
+ </dates>
+ </vuln>
+
+
<vuln vid="2c2d4e83-2370-11e0-a91b-00e0815b8da8">
<topic>tarsnap -- cryptographic nonce reuse</topic>
<affects>