ASTERWEB Blog

14Feb/20Off

Asterisk 13.31.0, 16.8.0, and 17.2.0 Now Available

Asterisk 13.31.0, 16.8.0, and 17.2.0 Now Available

Il TEAM di Asterisk ha annunciato di aver rilasciato il download di Asterisk 13.31.0, 16.8.0 e 17.2.0.

 

Le versioni sono disponibili per il download immediato all'indirizzo: https://downloads.asterisk.org/pub/telephony/asterisk/

... the link of the post: https://community.asterisk.org/t/asterisk-13-31-0-16-8-0-and-17-2-0-now-available/82578

 

22Nov/19Off

Asterisk 13.29.2, 16.6.2, 17.0.1, 13.21-cert5 Now Available

Asterisk 13.29.2, 16.6.2, 17.0.1, 13.21-cert5 Now Available

The Asterisk Development Team would like to announce security releases for
Asterisk 13, 16 and 17, and Certified Asterisk 13.21. The available releases are
released as versions 13.29.2, 16.6.2, 17.0.1 and 13.21-cert5.

... the link of the post: https://community.asterisk.org/t/asterisk-13-29-2-16-6-2-17-0-1-13-21-cert5-now-available/81734

1Nov/19Off

Asterisk 13.29.1 and 16.6.1 Now Available

Asterisk 13.29.1 and 16.6.1 Now Available

 

The Asterisk Development Team would like to announce the release of Asterisk 13.29.1 and 16.6.1 Now Available.

This release is available for immediate download at: https://downloads.asterisk.org/pub/telephony/asterisk/

29Ott/19Off

Asterisk 17.0.0 Now Available

Asterisk 17.0.0 Now Available

The Asterisk Development Team would like to announce the release of Asterisk 17.0.0

 

This release is available for immediate download at: https://downloads.asterisk.org/pub/telephony/asterisk/

22Ott/19Off

Asterisk 13.29.0 Now Available

 

Asterisk 13.29.0 Now Available

The Asterisk Development Team would like to announce the release of Asterisk 13.29.0.

This release candidate is available for immediate download at: https://downloads.asterisk.org/pub/telephony/asterisk

 

... the link of the post: https://community.asterisk.org/t/asterisk-17-0-0-rc2-now-available/81041

15Ott/19Off

Asterisk 16.6.0 Now Available

 

Asterisk 16.6.0 Now Available

The Asterisk Development Team would like to announce the release of Asterisk 16.6.0.

This release is available for immediate download at : https://downloads.asterisk.org/pub/telephony/asterisk

... the link of the post: https://community.asterisk.org/t/asterisk-16-6-0-now-available/81199

20Set/19Off

Asterisk 17.0.0-rc1 Now Available

The Asterisk Development Team would like to announce the first release candidate of Asterisk 17.0.0.
This release candidate is available for immediate download at
https://downloads.asterisk.org/pub/telephony/asterisk

The release of Asterisk 17.0.0-rc1 resolves several issues reported by the
community.

 

...the link of the post: https://www.asterisk.org/downloads/asterisk-news/asterisk-1700-rc1-now-available

 

28Feb/19Off

Asterisk 15.7.2 and 16.2.1 Now Available (Security)

The Asterisk Development Team would like to announce security releases for Asterisk 15 and 16. The available releases are released as versions 15.7.2 and 16.2.1.

These releases are available for immediate download at
https://downloads.asterisk.org/pub/telephony/asterisk/releases 10

The following security vulnerabilities were resolved in these versions:

AST-2019-001: Remote crash vulnerability with SDP protocol violation When Asterisk makes an outgoing call, a very specific SDP protocol violation by the remote party can cause Asterisk to crash.

For a full list of changes in the current releases, please see the ChangeLogs:

ChangeLog-15.7.2 4
ChangeLog-16.2.1 18

The security advisory is available at:

AST-2019-001.pdf 13

Thank you for your continued support of Asterisk!

23Dic/17Off

Rilasciati Asterisk 13.18.5, 14.7.5, 15.1.5 and 13.18-cert2 (Security)

The Asterisk Development Team would like to announce security releases for Asterisk 13, 14 and 15, and Certified Asterisk 13.18. The available releases are released as versions 13.18.5, 4.7.5, 15.1.5 and 13.18-cert2.

These releases are available for immediate download at
https://downloads.asterisk.org/pub/telephony/asterisk/releases
https://downloads.asterisk.org/pub/telephony/certified-asterisk/releases

The following security vulnerabilities were resolved in these versions:

* AST-2017-014: Crash in PJSIP resource when missing a contact header
A select set of SIP messages create a dialog in Asterisk. Those SIP messages
must contain a contact header. For those messages, if the header was not
present and using the PJSIP channel driver, it would cause Asterisk to crash.
The severity of this vulnerability is somewhat mitigated if authentication is
enabled. If authentication is enabled a user would have to first be authorized
before reaching the crash point.

For a full list of changes in the current releases, please see the ChangeLogs:

https://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-13.18.5
https://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-14.7.5
https://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-15.1.5
https://downloads.asterisk.org/pub/telephony/certified-asterisk/releases/ChangeLog-certified-13.18-cert2

The security advisory is available at:

https://downloads.asterisk.org/pub/security/AST-2017-014.pdf

22Dic/17Off

AST-2017-014: Crash in PJSIP resource when missing a contact header

               Asterisk Project Security Advisory - AST-2017-014

         Product        Asterisk                                              
         Summary        Crash in PJSIP resource when missing a contact        
                        header                                                
    Nature of Advisory  Remote Crash                                          
      Susceptibility    Remote Unauthenticated Sessions                       
         Severity       Moderate                                              
      Exploits Known    No                                                    
       Reported On      December 12, 2017                                     
       Reported By      Ross Beer                                             
        Posted On       
     Last Updated On    December 22, 2017                                     
     Advisory Contact   Kevin Harwell             
         CVE Name       

    Description  A select set of SIP messages create a dialog in Asterisk.    
                 Those SIP messages must contain a contact header. For those  
                 messages, if the header was not present and using the PJSIP  
                 channel driver, it would cause Asterisk to crash. The        
                 severity of this vulnerability is somewhat mitigated if      
                 authentication is enabled. If authentication is enabled a    
                 user would have to first be authorized before reaching the   
                 crash point.                                                 

    Resolution  When using the Asterisk PJSIP resource, and one of the SIP    
                messages that create a dialog is received Asterisk now        
                checks to see if the message contains a contact header. If    
                it does not Asterisk now responds with a "400 Missing         
                Contact header".                                              

                               Affected Versions       
                         Product                       Release  
                                                       Series   
                  Asterisk Open Source                  13.x    All versions  
                  Asterisk Open Source                  14.x    All versions  
                  Asterisk Open Source                  15.x    All versions  
                   Certified Asterisk                   13.18   All versions  

                                  Corrected In
          Product                              Release                        
    Asterisk Open Source               13.18.5, 14.7.5, 15.1.5                
     Certified Asterisk                      13.18-cert2                      

                                     Patches                          
                                SVN URL                               Revision  
   http://downloads.asterisk.org/pub/security/AST-2017-014-13.diff    Asterisk  
                                                                      13        
   http://downloads.asterisk.org/pub/security/AST-2017-014-14.diff    Asterisk  
                                                                      14        
   http://downloads.asterisk.org/pub/security/AST-2017-014-15.diff    Asterisk  
                                                                      15        
   http://downloads.asterisk.org/pub/security/AST-2017-014-13.18.diff Certified 
                                                                      Asterisk  
                                                                      13.18     

    Links  https://issues.asterisk.org/jira/browse/ASTERISK-27480             

    Asterisk Project Security Advisories are posted at                        
    http://www.asterisk.org/security                                          
                                                                              
    This document may be superseded by later versions; if so, the latest      
    version will be posted at                                                 
    http://downloads.digium.com/pub/security/AST-2017-014.pdf and             
    http://downloads.digium.com/pub/security/AST-2017-014.html                

                                Revision History
                     Date                       Editor       Revisions Made   
    December 20, 2017                        Kevin Harwell  Initial Revision  

               Asterisk Project Security Advisory - AST-2017-014
              Copyright (c) 2017 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.
14Dic/17Off

AST-2017-012: Remote Crash Vulnerability in RTCP Stack

               Asterisk Project Security Advisory - AST-2017-012

          Product         Asterisk                                            
          Summary         Remote Crash Vulnerability in RTCP Stack            
     Nature of Advisory   Denial of Service                                   
       Susceptibility     Remote Unauthenticated Sessions                     
          Severity        Moderate                                            
       Exploits Known     No                                                  
        Reported On       October 30, 2017                                    
        Reported By       Tzafrir Cohen and Vitezslav Novy                    
         Posted On        December 13, 2017                                   
      Last Updated On     December 12, 2017                                   
      Advisory Contact    Jcolp AT digium DOT com                             
          CVE Name        

    Description  If a compound RTCP packet is received containing more than   
                 one report (for example a Receiver Report and a Sender       
                 Report) the RTCP stack will incorrectly store report         
                 information outside of allocated memory potentially causing  
                 a crash.                                                     
                                                                              
                 For all versions of Asterisk this vulnerability requires an  
                 active call to be established.                               
                                                                              
                 For versions of Asterisk 13.17.2, 14.6.2, 15.0.0,            
                 13.13-cert6 and greater an additional level of security is   
                 placed upon RTCP packets. If the probation period for        
                 incoming RTP traffic has passed any received RTCP packets    
                 must contain the same SSRC as the RTP traffic. If the RTCP   
                 packets do not then they are dropped. This ensures other     
                 parties can not inject RTCP packets without they themselves  
                 establishing an active call.                                 

    Resolution  The RTCP stack has been changed so the report information is  
                always stored in allocated memory. The provided patches can   
                be applied to the appropriate version or the latest version   
                of Asterisk can be installed to receive the fix.              

                               Affected Versions
                Product              Release Series  
         Asterisk Open Source             13.x       All Versions             
         Asterisk Open Source             14.x       All Versions             
         Asterisk Open Source             15.x       All Versions             
          Certified Asterisk             13.13       All Versions             

                                  Corrected In
                 Product                              Release                 
           Asterisk Open Source               13.18.4, 14.7.4, 15.1.4         
            Certified Asterisk                      13.13-cert9               

                                     Patches                          
                                SVN URL                               Revision  
   http://downloads.asterisk.org/pub/security/AST-2017-012-13.diff    Asterisk  
                                                                      13        
   http://downloads.asterisk.org/pub/security/AST-2017-012-14.diff    Asterisk  
                                                                      14        
   http://downloads.asterisk.org/pub/security/AST-2017-012-15.diff    Asterisk  
                                                                      15        
   http://downloads.asterisk.org/pub/security/AST-2017-012-13.13.diff Certified 
                                                                      Asterisk  
                                                                      13.13     

       Links     https://issues.asterisk.org/jira/browse/ASTERISK-27382       
                                                                              
                 https://issues.asterisk.org/jira/browse/ASTERISK-27429       

    Asterisk Project Security Advisories are posted at                        
    http://www.asterisk.org/security                                          
                                                                              
    This document may be superseded by later versions; if so, the latest      
    version will be posted at                                                 
    http://downloads.digium.com/pub/security/AST-2017-012.pdf and             
    http://downloads.digium.com/pub/security/AST-2017-012.html                

                                Revision History
          Date                 Editor                  Revisions Made         
    November 30, 2017  Joshua Colp              Initial Revision              

               Asterisk Project Security Advisory - AST-2017-012
               Copyright © 2017 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.
2Dic/17Off

AST-2017-013: DOS Vulnerability in Asterisk chan_skinny

               Asterisk Project Security Advisory - AST-2017-013

          Product         Asterisk                                            
          Summary         DOS Vulnerability in Asterisk chan_skinny           
     Nature of Advisory   Denial of Service                                   
       Susceptibility     Remote Unauthenticated Sessions                     
          Severity        Moderate                                            
       Exploits Known     Yes                                                 
        Reported On       November 30, 2017                                   
        Reported By       Juan Sacco                                          
         Posted On        December 1, 2017                                    
      Last Updated On     December 1, 2017                                    
      Advisory Contact    gjoseph AT digium DOT com                           
          CVE Name        

    Description  If the chan_skinny (AKA SCCP protocol) channel driver is     
                 flooded with certain requests it can cause the asterisk      
                 process to use excessive amounts of virtual memory           
                 eventually causing asterisk to stop processing requests of   
                 any kind.                                                    

    Resolution  The chan_skinny driver has been updated to release memory     
                allocations in a correct manner thereby preventing any        
                possiblity of exhaustion.                                     

                               Affected Versions
                Product              Release Series  
         Asterisk Open Source             13.x       All Versions             
         Asterisk Open Source             14.x       All Versions             
         Asterisk Open Source             15.x       All Versions             
          Certified Asterisk             13.13       All Versions             

                                  Corrected In
                 Product                              Release                 
           Asterisk Open Source               13.18.3, 14.7.3, 15.1.3         
            Certified Asterisk                      13.13-cert8               

                                     Patches                          
                                SVN URL                               Revision  
   http://downloads.asterisk.org/pub/security/AST-2017-013-13.diff    Asterisk  
                                                                      13        
   http://downloads.asterisk.org/pub/security/AST-2017-013-14.diff    Asterisk  
                                                                      14        
   http://downloads.asterisk.org/pub/security/AST-2017-013-15.diff    Asterisk  
                                                                      15        
   http://downloads.asterisk.org/pub/security/AST-2017-013-13.13.diff Certified 
                                                                      Asterisk  
                                                                      13.13     

       Links     https://issues.asterisk.org/jira/browse/ASTERISK-27452       

    Asterisk Project Security Advisories are posted at                        
    http://www.asterisk.org/security                                          
                                                                              
    This document may be superseded by later versions; if so, the latest      
    version will be posted at                                                 
    http://downloads.digium.com/pub/security/AST-2017-013.pdf and             
    http://downloads.digium.com/pub/security/AST-2017-013.html                

                                Revision History
          Date                  Editor                 Revisions Made         
    November 30, 2017  George Joseph             Initial Revision             

               Asterisk Project Security Advisory - AST-2017-013
               Copyright © 2017 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.

2Dic/17Off

Security releases for Certified Asterisk 13.13 and Asterisk 13, 14 and 15

The Asterisk Development Team has announced security releases for
Certified Asterisk 13.13 and Asterisk 13, 14 and 15.  The available
security releases are released as versions 13.13-cert8, 13.18.3,
14.7.3 and 15.1.3.

These releases are available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/releases

The release of these versions resolves the following security
vulnerabilities:

* AST-2017-013: DOS Vulnerability in Asterisk chan_skinny
  If the chan_skinny (AKA SCCP protocol) channel driver is  
  flooded with certain requests it can cause the asterisk   
  process to use excessive amounts of virtual memory        
  eventually causing asterisk to stop processing requests of
  any kind.                                                 

For a full list of changes in the current releases, please see the
ChangeLogs:
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-13.18.3
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog=14.7.3
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-15.1.3
http://downloads.asterisk.org/pub/telephony/certified-asterisk/ChangeLog-certified-13.13-cert8

The security advisories are available at:
http://downloads.asterisk.org/pub/security/AST-2017-013.pdf
9Nov/17Off

AST-2017-011: Memory leak in pjsip session resource

               Asterisk Project Security Advisory - AST-2017-011

         Product        Asterisk                                              
         Summary        Memory leak in pjsip session resource                 
    Nature of Advisory  Memory leak                                           
      Susceptibility    Remote Sessions                                       
         Severity       Minor                                                 
      Exploits Known    No                                                    
       Reported On      October 15, 2017                                      
       Reported By      Correy Farrell                                        
        Posted On       
     Last Updated On    October 19, 2017                                      
     Advisory Contact   kharwell AT digium DOT com                            
         CVE Name       

    Description  A memory leak occurs when an Asterisk pjsip session object   
                 is created and that call gets rejected before the session    
                 itself is fully established. When this happens the session   
                 object never gets destroyed.                                 

    Resolution  Asterisk now releases the session object and all associated   
                memory when a call gets rejected.                             

                               Affected Versions       
                         Product                       Release  
                                                       Series   
                  Asterisk Open Source                  13.x    13.5.0+       
                  Asterisk Open Source                  14.x    All Releases  
                  Asterisk Open Source                  15.x    All Releases  
                   Certified Asterisk                   13.13   All Releases  

                                  Corrected In
          Product                              Release                        
    Asterisk Open Source               13.18.1, 14.7.1, 15.1.1                
     Certified Asterisk                      13.13-cert7                      

                                     Patches                          
                                SVN URL                               Revision  
   http://downloads.asterisk.org/pub/security/AST-2017-011-13.diff    Asterisk  
                                                                      13        
   http://downloads.asterisk.org/pub/security/AST-2017-011-14.diff    Asterisk  
                                                                      14        
   http://downloads.asterisk.org/pub/security/AST-2017-011-15.diff    Asterisk  
                                                                      15        
   http://downloads.asterisk.org/pub/security/AST-2017-011-13.13.diff Certified 
                                                                      Asterisk  
                                                                      13.13     

    Links  https://issues.asterisk.org/jira/browse/ASTERISK-27345             

    Asterisk Project Security Advisories are posted at                        
    http://www.asterisk.org/security                                          
                                                                              
    This document may be superseded by later versions; if so, the latest      
    version will be posted at                                                 
    http://downloads.digium.com/pub/security/AST-2017-011.pdf and             
    http://downloads.digium.com/pub/security/AST-2017-011.html                

                                Revision History
                     Date                       Editor       Revisions Made   
    October 19, 2017                         Kevin Harwell  Initial Revision  

               Asterisk Project Security Advisory - AST-2017-011
              Copyright (c) 2017 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.
9Nov/17Off

AST-2017-010: Buffer overflow in CDR’s set user

               Asterisk Project Security Advisory - AST-2017-010

         Product        Asterisk                                              
         Summary        Buffer overflow in CDR's set user                     
    Nature of Advisory  Buffer Overflow                                       
      Susceptibility    Remote Authenticated Sessions                         
         Severity       Moderate                                              
      Exploits Known    No                                                    
       Reported On      October 9, 2017                                       
       Reported By      Richard Mudgett                                       
        Posted On       
     Last Updated On    October 25, 2017                                      
     Advisory Contact   Rmudgett AT digium DOT com                            
         CVE Name       

    Description  No size checking is done when setting the user field for     
                 Party B on a CDR. Thus, it is possible for someone to use    
                 an arbitrarily large string and write past the end of the    
                 user field storage buffer. The earlier AST-2017-001          
                 advisory for the CDR user field overflow was for the Party   
                 A buffer.                                                    
                                                                              
                 This currently affects any system using CDR's that also      
                 make use of the following:                                   
                                                                              
                 * The 'X-ClientCode' header within a SIP INFO message when   
                 using chan_sip and                                           
                                                                              
                 the 'useclientcode' option is enabled (note, it's disabled   
                 by default).                                                 
                                                                              
                 * The CDR dialplan function executed from AMI when setting   
                 the user field.                                              
                                                                              
                 * The AMI Monitor action when using a long file name/path.   

    Resolution  The CDR engine now only copies up to the maximum allowed      
                characters into the user field. Any characters outside the    
                maximum are truncated.                                        

                               Affected Versions       
                         Product                       Release  
                                                       Series   
                  Asterisk Open Source                  13.x    All Releases  
                  Asterisk Open Source                  14.x    All Releases  
                  Asterisk Open Source                  15.x    All Releases  
                   Certified Asterisk                   13.13   All Releases  

                                  Corrected In
          Product                              Release                        
    Asterisk Open Source               13.18.1, 14.7.1, 15.1.1                
     Certified Asterisk                      13.13-cert7                      

                                     Patches                          
                                SVN URL                               Revision  
   http://downloads.asterisk.org/pub/security/AST-2017-010-13.diff    Asterisk  
                                                                      13        
   http://downloads.asterisk.org/pub/security/AST-2017-010-14.diff    Asterisk  
                                                                      14        
   http://downloads.asterisk.org/pub/security/AST-2017-010-15.diff    Asterisk  
                                                                      15        
   http://downloads.asterisk.org/pub/security/AST-2017-010-13.13.diff Certified 
                                                                      Asterisk  
                                                                      13.13     

    Links  https://issues.asterisk.org/jira/browse/ASTERISK-27337             

    Asterisk Project Security Advisories are posted at                        
    http://www.asterisk.org/security                                          
                                                                              
    This document may be superseded by later versions; if so, the latest      
    version will be posted at                                                 
    http://downloads.digium.com/pub/security/AST-2017-010.pdf and             
    http://downloads.digium.com/pub/security/AST-2017-010.html                

                                Revision History
                    Date                       Editor        Revisions Made   
    October 12, 2017                       Richard Mudgett  Initial Revision  

               Asterisk Project Security Advisory - AST-2017-010
               Copyright © 2017 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.