svn commit: r368528 - branches/2014Q3/security/vuxml
Guido Falsi
madpilot at FreeBSD.org
Thu Sep 18 21:02:58 UTC 2014
Author: madpilot
Date: Thu Sep 18 21:02:57 2014
New Revision: 368528
URL: http://svnweb.freebsd.org/changeset/ports/368528
QAT: https://qat.redports.org/buildarchive/r368528/
Log:
MFH: r368515
Document new asterisk11 vulnerability.
Approved by: portmgr (zi)
Modified:
branches/2014Q3/security/vuxml/vuln.xml
Directory Properties:
branches/2014Q3/ (props changed)
Modified: branches/2014Q3/security/vuxml/vuln.xml
==============================================================================
--- branches/2014Q3/security/vuxml/vuln.xml Thu Sep 18 21:00:30 2014 (r368527)
+++ branches/2014Q3/security/vuxml/vuln.xml Thu Sep 18 21:02:57 2014 (r368528)
@@ -57,6 +57,44 @@ Notes:
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="e60d9e65-3f6b-11e4-ad16-001999f8d30b">
+ <topic>asterisk -- Remotely triggered crash</topic>
+ <affects>
+ <package>
+ <name>asterisk11</name>
+ <range><lt>11.12.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Asterisk project reports:</p>
+ <blockquote cite="https://www.asterisk.org/security">
+ <p>When an out of call message - delivered by either the
+ SIP or PJSIP channel driver or the XMPP stack - is handled
+ in Asterisk, a crash can occur if the channel servicing
+ the message is sent into the ReceiveFax dialplan application
+ while using the res_fax_spandsp module.</p>
+ <p>Note that this crash does not occur when using the
+ res_fax_digium module. While this crash technically
+ occurs due to a configuration issue, as attempting to
+ receive a fax from a channel driver that only contains
+ textual information will never succeed, the likelihood
+ of having it occur is sufficiently high as to warrant
+ this advisory.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://downloads.asterisk.org/pub/security/AST-2014-010.pdf</url>
+ <url>https://issues.asterisk.org/jira/browse/ASTERISK-24301</url>
+ <url>https://www.asterisk.org/security</url>
+ </references>
+ <dates>
+ <discovery>2014-09-05</discovery>
+ <entry>2014-09-18</entry>
+ </dates>
+ </vuln>
+
<vuln vid="36a415c8-3867-11e4-b522-00262d5ed8ee">
<topic>www/chromium -- multiple vulnerabilities</topic>
<affects>
More information about the svn-ports-branches
mailing list