Lucene search

K
debianDebianDEBIAN:DLA-1225-1:12891
HistoryDec 30, 2017 - 6:50 p.m.

[SECURITY] [DLA 1225-1] asterisk security update

2017-12-3018:50:46
lists.debian.org
12

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.7 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.693 Medium

EPSS

Percentile

98.0%

Package : asterisk
Version : 1:1.8.13.1~dfsg1-3+deb7u8
CVE ID : CVE-2017-17090
Debian Bug : 883342

A vulnerability has been discovered in Asterisk, an open source PBX and
telephony toolkit, which may result in resource exhaustion and denial of
service.

CVE-2017-17090: memory leak from chan_skinny.
If the chan_skinny (AKA SCCP protocol) channel driver is flooded with
certain requests it can cause the asterisk process to use excessive
amounts of virtual memory eventually causing asterisk to stop processing
requests of any kind. The chan_skinny driver has been updated to release
memory allocations in a correct manner thereby preventing any possiblity
of exhaustion.

For Debian 7 "Wheezy", these problems have been fixed in version
1:1.8.13.1~dfsg1-3+deb7u8.

We recommend that you upgrade your asterisk packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

OSVersionArchitecturePackageVersionFilename
Debian7allasterisk< 1:1.8.13.1~dfsg1-3+deb7u8asterisk_1:1.8.13.1~dfsg1-3+deb7u8_all.deb

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.7 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.693 Medium

EPSS

Percentile

98.0%