Product Asterisk Summary Remote crash vulnerability in TCP/TLS server Nature of Advisory Denial of Service Susceptibility Remote Unauthenticated Sessions Severity Critical Exploits Known No Reported On March 1, 2011 Reported By Blake Cornell and Chris Maj Posted On March 16, 2011 Last Updated On March 14, 2011 Advisory Contact Terry Wilson Rapidly opening and closing TCP connections to services using Description the ast_tcptls_* API (primarily chan_sip, manager, and res_phoneprov) can cause Asterisk to crash after dereferencing a NULL pointer. Resolution Failure of the fdopen call is detected and dereferencing the NULL pointer is avoided. Affected Versions Product Release Series Asterisk Open Source 1.6.1.x All versions Asterisk Open Source 1.6.2.x All versions Asterisk Open Source 1.8.x All versions Corrected In Product Release Asterisk Open Source 1.6.1.23, 1.6.2.17.1, 1.8.3.1 Patches URL Branch http://downloads.asterisk.org/pub/security/AST-2011-004-1.6.1.diff 1.6.1 http://downloads.asterisk.org/pub/security/AST-2011-004-1.6.2.diff 1.6.2 http://downloads.asterisk.org/pub/security/AST-2011-004-1.8.diff 1.8 Links Asterisk Project Security Advisories are posted at http://www.asterisk.org/security This document may be superseded by later versions; if so, the latest version will be posted at http://downloads.digium.com/pub/security/AST-2011-004.pdf and http://downloads.digium.com/pub/security/AST-2011-004.html Revision History Date Editor Revisions Made 2011-03-14 Terry Wilson Initial release _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/