ASTERWEB Blog

16Mar/18Off

Rilasciato Asterisk 15.3.0

Il giorno 15 marzo 2018, il Team di Sviluppo di Asterisk ha annunciato il rilascio di Asterisk 15.3.0.

Dal post originale:

The release of Asterisk 15.3.0 resolves several issues reported by the community and would have not been possible without your participation.

Thank you!

The following issues are resolved in this release:

Security bugs fixed in this release:
-----------------------------------
* ASTERISK-27658 - WebSocket frames with 0 sized payload causes DoS (Reported by Sean Bright)
...

Rilasciato Asterisk 15.3.0

16Mar/18Off

Rilasciato Asterisk 13.20.0

Il giorno 15 marzo 2018, il Team di Sviluppo di Asterisk ha annunciato il rilascio di Asterisk 13.20.0.

Dal post originale:

The release of Asterisk 13.20.0 resolves several issues reported by the community and would have not been possible without your participation.

Thank you!

The following issues are resolved in this release:

Security bugs fixed in this release:
-----------------------------------
* ASTERISK-27583 - Segmentation fault occurs in asterisk with an invalid SDP fmtp attribute (Reported by Sandro Gauci)
...

Rilasciato Asterisk 13.20.0

14Gen/18Off

Rilasciato Asterisk 15.2.0

Il giorno 13 gennaio 2018, il Team di Sviluppo di Asterisk ha annunciato il rilascio di Asterisk 15.2.0.

Dal post originale:

The release of Asterisk 15.2.0 resolves several issues reported by the community and would have not been possible without your participation.

Thank you!

The following issues are resolved in this release:

New Features made in this release:
-----------------------------------
* ASTERISK-27478 - PJSIP: Add CHANNEL(pjsip,request_uri) to get incoming INVITE Request-URI. (Reported by Richard Mudgett)
...

Rilasciato Asterisk 15.2.0

14Gen/18Off

Rilasciato Asterisk 13.19.0

Il giorno 13 gennaio 2018, il Team di Sviluppo di Asterisk ha annunciato il rilascio di Asterisk 13.19.0.

Dal post originale:

The release of Asterisk 13.19.0 resolves several issues reported by the community and would have not been possible without your participation.

Thank you!

The following issues are resolved in this release:

New Features made in this release:
-----------------------------------
* ASTERISK-27478 - PJSIP: Add CHANNEL(pjsip,request_uri) to get incoming INVITE Request-URI. (Reported by Richard Mudgett)
...

Rilasciato Asterisk 13.19.0

23Dic/17Off

Rilasciati Asterisk 13.18.5, 14.7.5, 15.1.5 and 13.18-cert2 (Security)

The Asterisk Development Team would like to announce security releases for Asterisk 13, 14 and 15, and Certified Asterisk 13.18. The available releases are released as versions 13.18.5, 4.7.5, 15.1.5 and 13.18-cert2.

These releases are available for immediate download at
https://downloads.asterisk.org/pub/telephony/asterisk/releases
https://downloads.asterisk.org/pub/telephony/certified-asterisk/releases

The following security vulnerabilities were resolved in these versions:

* AST-2017-014: Crash in PJSIP resource when missing a contact header
A select set of SIP messages create a dialog in Asterisk. Those SIP messages
must contain a contact header. For those messages, if the header was not
present and using the PJSIP channel driver, it would cause Asterisk to crash.
The severity of this vulnerability is somewhat mitigated if authentication is
enabled. If authentication is enabled a user would have to first be authorized
before reaching the crash point.

For a full list of changes in the current releases, please see the ChangeLogs:

https://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-13.18.5
https://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-14.7.5
https://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-15.1.5
https://downloads.asterisk.org/pub/telephony/certified-asterisk/releases/ChangeLog-certified-13.18-cert2

The security advisory is available at:

https://downloads.asterisk.org/pub/security/AST-2017-014.pdf

22Dic/17Off

AST-2017-014: Crash in PJSIP resource when missing a contact header

               Asterisk Project Security Advisory - AST-2017-014

         Product        Asterisk                                              
         Summary        Crash in PJSIP resource when missing a contact        
                        header                                                
    Nature of Advisory  Remote Crash                                          
      Susceptibility    Remote Unauthenticated Sessions                       
         Severity       Moderate                                              
      Exploits Known    No                                                    
       Reported On      December 12, 2017                                     
       Reported By      Ross Beer                                             
        Posted On       
     Last Updated On    December 22, 2017                                     
     Advisory Contact   Kevin Harwell             
         CVE Name       

    Description  A select set of SIP messages create a dialog in Asterisk.    
                 Those SIP messages must contain a contact header. For those  
                 messages, if the header was not present and using the PJSIP  
                 channel driver, it would cause Asterisk to crash. The        
                 severity of this vulnerability is somewhat mitigated if      
                 authentication is enabled. If authentication is enabled a    
                 user would have to first be authorized before reaching the   
                 crash point.                                                 

    Resolution  When using the Asterisk PJSIP resource, and one of the SIP    
                messages that create a dialog is received Asterisk now        
                checks to see if the message contains a contact header. If    
                it does not Asterisk now responds with a "400 Missing         
                Contact header".                                              

                               Affected Versions       
                         Product                       Release  
                                                       Series   
                  Asterisk Open Source                  13.x    All versions  
                  Asterisk Open Source                  14.x    All versions  
                  Asterisk Open Source                  15.x    All versions  
                   Certified Asterisk                   13.18   All versions  

                                  Corrected In
          Product                              Release                        
    Asterisk Open Source               13.18.5, 14.7.5, 15.1.5                
     Certified Asterisk                      13.18-cert2                      

                                     Patches                          
                                SVN URL                               Revision  
   http://downloads.asterisk.org/pub/security/AST-2017-014-13.diff    Asterisk  
                                                                      13        
   http://downloads.asterisk.org/pub/security/AST-2017-014-14.diff    Asterisk  
                                                                      14        
   http://downloads.asterisk.org/pub/security/AST-2017-014-15.diff    Asterisk  
                                                                      15        
   http://downloads.asterisk.org/pub/security/AST-2017-014-13.18.diff Certified 
                                                                      Asterisk  
                                                                      13.18     

    Links  https://issues.asterisk.org/jira/browse/ASTERISK-27480             

    Asterisk Project Security Advisories are posted at                        
    http://www.asterisk.org/security                                          
                                                                              
    This document may be superseded by later versions; if so, the latest      
    version will be posted at                                                 
    http://downloads.digium.com/pub/security/AST-2017-014.pdf and             
    http://downloads.digium.com/pub/security/AST-2017-014.html                

                                Revision History
                     Date                       Editor       Revisions Made   
    December 20, 2017                        Kevin Harwell  Initial Revision  

               Asterisk Project Security Advisory - AST-2017-014
              Copyright (c) 2017 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.
22Dic/17Off

Rilasciato Asterisk 13.18-cert1

Il giorno 21 dicembre 2017, il Team di Sviluppo di Asterisk ha annunciato il rilascio di Asterisk 13.18-cert1.

Dal post originale:

The following issues are resolved in this release:

Improvements made in this release:
-----------------------------------
* ASTERISK-27355 - Upgrade bundled PJPROJECT to 2.7
...

Rilasciato Asterisk 13.18-cert1

14Dic/17Off

AST-2017-012: Remote Crash Vulnerability in RTCP Stack

               Asterisk Project Security Advisory - AST-2017-012

          Product         Asterisk                                            
          Summary         Remote Crash Vulnerability in RTCP Stack            
     Nature of Advisory   Denial of Service                                   
       Susceptibility     Remote Unauthenticated Sessions                     
          Severity        Moderate                                            
       Exploits Known     No                                                  
        Reported On       October 30, 2017                                    
        Reported By       Tzafrir Cohen and Vitezslav Novy                    
         Posted On        December 13, 2017                                   
      Last Updated On     December 12, 2017                                   
      Advisory Contact    Jcolp AT digium DOT com                             
          CVE Name        

    Description  If a compound RTCP packet is received containing more than   
                 one report (for example a Receiver Report and a Sender       
                 Report) the RTCP stack will incorrectly store report         
                 information outside of allocated memory potentially causing  
                 a crash.                                                     
                                                                              
                 For all versions of Asterisk this vulnerability requires an  
                 active call to be established.                               
                                                                              
                 For versions of Asterisk 13.17.2, 14.6.2, 15.0.0,            
                 13.13-cert6 and greater an additional level of security is   
                 placed upon RTCP packets. If the probation period for        
                 incoming RTP traffic has passed any received RTCP packets    
                 must contain the same SSRC as the RTP traffic. If the RTCP   
                 packets do not then they are dropped. This ensures other     
                 parties can not inject RTCP packets without they themselves  
                 establishing an active call.                                 

    Resolution  The RTCP stack has been changed so the report information is  
                always stored in allocated memory. The provided patches can   
                be applied to the appropriate version or the latest version   
                of Asterisk can be installed to receive the fix.              

                               Affected Versions
                Product              Release Series  
         Asterisk Open Source             13.x       All Versions             
         Asterisk Open Source             14.x       All Versions             
         Asterisk Open Source             15.x       All Versions             
          Certified Asterisk             13.13       All Versions             

                                  Corrected In
                 Product                              Release                 
           Asterisk Open Source               13.18.4, 14.7.4, 15.1.4         
            Certified Asterisk                      13.13-cert9               

                                     Patches                          
                                SVN URL                               Revision  
   http://downloads.asterisk.org/pub/security/AST-2017-012-13.diff    Asterisk  
                                                                      13        
   http://downloads.asterisk.org/pub/security/AST-2017-012-14.diff    Asterisk  
                                                                      14        
   http://downloads.asterisk.org/pub/security/AST-2017-012-15.diff    Asterisk  
                                                                      15        
   http://downloads.asterisk.org/pub/security/AST-2017-012-13.13.diff Certified 
                                                                      Asterisk  
                                                                      13.13     

       Links     https://issues.asterisk.org/jira/browse/ASTERISK-27382       
                                                                              
                 https://issues.asterisk.org/jira/browse/ASTERISK-27429       

    Asterisk Project Security Advisories are posted at                        
    http://www.asterisk.org/security                                          
                                                                              
    This document may be superseded by later versions; if so, the latest      
    version will be posted at                                                 
    http://downloads.digium.com/pub/security/AST-2017-012.pdf and             
    http://downloads.digium.com/pub/security/AST-2017-012.html                

                                Revision History
          Date                 Editor                  Revisions Made         
    November 30, 2017  Joshua Colp              Initial Revision              

               Asterisk Project Security Advisory - AST-2017-012
               Copyright © 2017 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.
14Dic/17Off

Rilasciati Asterisk 13.18.4, 14.7.4, 15.1.4 and Certified Asterisk 13.13-cert9

The Asterisk Development Team has announced security releases for Certified Asterisk 13.13 and Asterisk 13, 14 and 15. The available security releases are released as versions 13.13-cert9, 13.18.4, 14.7.4 and 15.1.4.

These releases are available for immediate download at http://downloads.asterisk.org/pub/telephony/asterisk/releases

The release of these versions resolves the following security vulnerabilities:

* AST-2017-012: Remote Crash Vulnerability in RTCP Stack
If a compound RTCP packet is received containing more than one report (for example a Receiver Report and a Sender Report) the RTCP stack will incorrectly store report information outside of allocated memory potentially causing a crash.

For a full list of changes in the current releases, please see the ChangeLogs:
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-13.18.4
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-14.7.4
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-15.1.4
http://downloads.asterisk.org/pub/telephony/certified-asterisk/ChangeLog-certified-13.13-cert9

The security advisories are available at:
http://downloads.asterisk.org/pub/security/AST-2017-012.html
http://downloads.asterisk.org/pub/security/AST-2017-012.pdf

2Dic/17Off

AST-2017-013: DOS Vulnerability in Asterisk chan_skinny

               Asterisk Project Security Advisory - AST-2017-013

          Product         Asterisk                                            
          Summary         DOS Vulnerability in Asterisk chan_skinny           
     Nature of Advisory   Denial of Service                                   
       Susceptibility     Remote Unauthenticated Sessions                     
          Severity        Moderate                                            
       Exploits Known     Yes                                                 
        Reported On       November 30, 2017                                   
        Reported By       Juan Sacco                                          
         Posted On        December 1, 2017                                    
      Last Updated On     December 1, 2017                                    
      Advisory Contact    gjoseph AT digium DOT com                           
          CVE Name        

    Description  If the chan_skinny (AKA SCCP protocol) channel driver is     
                 flooded with certain requests it can cause the asterisk      
                 process to use excessive amounts of virtual memory           
                 eventually causing asterisk to stop processing requests of   
                 any kind.                                                    

    Resolution  The chan_skinny driver has been updated to release memory     
                allocations in a correct manner thereby preventing any        
                possiblity of exhaustion.                                     

                               Affected Versions
                Product              Release Series  
         Asterisk Open Source             13.x       All Versions             
         Asterisk Open Source             14.x       All Versions             
         Asterisk Open Source             15.x       All Versions             
          Certified Asterisk             13.13       All Versions             

                                  Corrected In
                 Product                              Release                 
           Asterisk Open Source               13.18.3, 14.7.3, 15.1.3         
            Certified Asterisk                      13.13-cert8               

                                     Patches                          
                                SVN URL                               Revision  
   http://downloads.asterisk.org/pub/security/AST-2017-013-13.diff    Asterisk  
                                                                      13        
   http://downloads.asterisk.org/pub/security/AST-2017-013-14.diff    Asterisk  
                                                                      14        
   http://downloads.asterisk.org/pub/security/AST-2017-013-15.diff    Asterisk  
                                                                      15        
   http://downloads.asterisk.org/pub/security/AST-2017-013-13.13.diff Certified 
                                                                      Asterisk  
                                                                      13.13     

       Links     https://issues.asterisk.org/jira/browse/ASTERISK-27452       

    Asterisk Project Security Advisories are posted at                        
    http://www.asterisk.org/security                                          
                                                                              
    This document may be superseded by later versions; if so, the latest      
    version will be posted at                                                 
    http://downloads.digium.com/pub/security/AST-2017-013.pdf and             
    http://downloads.digium.com/pub/security/AST-2017-013.html                

                                Revision History
          Date                  Editor                 Revisions Made         
    November 30, 2017  George Joseph             Initial Revision             

               Asterisk Project Security Advisory - AST-2017-013
               Copyright © 2017 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.

2Dic/17Off

Security releases for Certified Asterisk 13.13 and Asterisk 13, 14 and 15

The Asterisk Development Team has announced security releases for
Certified Asterisk 13.13 and Asterisk 13, 14 and 15.  The available
security releases are released as versions 13.13-cert8, 13.18.3,
14.7.3 and 15.1.3.

These releases are available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/releases

The release of these versions resolves the following security
vulnerabilities:

* AST-2017-013: DOS Vulnerability in Asterisk chan_skinny
  If the chan_skinny (AKA SCCP protocol) channel driver is  
  flooded with certain requests it can cause the asterisk   
  process to use excessive amounts of virtual memory        
  eventually causing asterisk to stop processing requests of
  any kind.                                                 

For a full list of changes in the current releases, please see the
ChangeLogs:
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-13.18.3
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog=14.7.3
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-15.1.3
http://downloads.asterisk.org/pub/telephony/certified-asterisk/ChangeLog-certified-13.13-cert8

The security advisories are available at:
http://downloads.asterisk.org/pub/security/AST-2017-013.pdf
2Dic/17Off

Rilasciati Asterisk 13.18.3, 14.7.3, 15.1.3 and Certified Asterisk 13.13-cert8

The Asterisk Development Team has announced security releases for Certified Asterisk 13.13 and Asterisk 13, 14 and 15. The available security releases are released as versions 13.13-cert8, 13.18.3, 14.7.3 and 15.1.3.

These releases are available for immediate download at http://downloads.asterisk.org/pub/telephony/asterisk/releases

The release of these versions resolves the following security vulnerabilities:

* AST-2017-013: DOS Vulnerability in Asterisk chan_skinny
If the chan_skinny (AKA SCCP protocol) channel driver is flooded with certain requests it can cause the asterisk process to use excessive amounts of virtual memory eventually causing sterisk
to stop processing requests of any kind.

For a full list of changes in the current releases, please see the ChangeLogs:
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-13.18.3
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog=14.7.3
http://downloads.asterisk.org/pub/telephony/certified-asterisk/ChangeLog-certified-13.13-cert8

The security advisories are available at:
http://downloads.asterisk.org/pub/security/AST-2017-013.pdf

11Nov/17Off

Rilasciato Asterisk 15.1.2

Il giorno 10 novembre 2017, il Team di Sviluppo di Asterisk ha annunciato il rilascio di Asterisk 15.1.2.

Dal post originale:

The release of Asterisk 15.1.2 resolves several issues reported by the community and would have not been possible without your participation.

Thank you!

The following issues are resolved in this release:

Bugs fixed in this release:
-----------------------------------
* ASTERISK-27387 - Regression: pjsip 13.18.0 - from_user - "+" character isn't allowed any more (Reported by Michael Maier)
* ASTERISK-27391 - Regression: Deadlock between AOR named lock and pjproject grp lock (Reported by shaurya jain)

For a full list of changes in this release, please see the ChangeLog:
http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-15.1.2

11Nov/17Off

Rilasciato Asterisk 14.7.2

Il giorno 10 novembre 2017, il Team di Sviluppo di Asterisk ha annunciato il rilascio di Asterisk 14.7.2.

Dal post originale:

The release of Asterisk 14.7.2 resolves several issues reported by the community and would have not been possible without your participation.

Thank you!

The following issues are resolved in this release:

Bugs fixed in this release:
-----------------------------------
* ASTERISK-27387 - Regression: pjsip 13.18.0 - from_user - "+" character isn't allowed any more (Reported by Michael Maier)
* ASTERISK-27391 - Regression: Deadlock between AOR named lock and pjproject grp lock (Reported by shaurya jain)

For a full list of changes in this release, please see the ChangeLog:
http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-14.7.2

11Nov/17Off

Rilasciato Asterisk 13.18.2

Il giorno 10 novembre 2017, il Team di Sviluppo di Asterisk ha annunciato il rilascio di Asterisk 13.18.2.

Dal post originale:

The release of Asterisk 13.18.2 resolves several issues reported by the community and would have not been possible without your participation.

Thank you!

The following issues are resolved in this release:

Bugs fixed in this release:
-----------------------------------
* ASTERISK-27387 - Regression: pjsip 13.18.0 - from_user - "+" character isn't allowed any more (Reported by Michael Maier)
* ASTERISK-27391 - Regression: Deadlock between AOR named lock and pjproject grp lock (Reported by shaurya jain)

For a full list of changes in this release, please see the ChangeLog:
http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-13.18.2