Lucene search

K
gentooGentoo FoundationGLSA-201110-21
HistoryOct 24, 2011 - 12:00 a.m.

Asterisk: Multiple vulnerabilities

2011-10-2400:00:00
Gentoo Foundation
security.gentoo.org
8

9 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

0.965 High

EPSS

Percentile

99.6%

Background

Asterisk is an open source telephony engine and toolkit.

Description

Multiple vulnerabilities have been discovered in Asterisk. Please review the CVE identifiers referenced below for details.

Impact

An unauthenticated remote attacker may execute code with the privileges of the Asterisk process or cause a Denial of Service.

Workaround

There is no known workaround at this time.

Resolution

All asterisk 1.6.x users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-misc/asterisk-1.6.2.18.2"

All asterisk 1.8.x users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-misc/asterisk-1.8.7.1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-misc/asterisk<Β 1.8.7.1UNKNOWN

9 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

0.965 High

EPSS

Percentile

99.6%