From owner-svn-ports-all@freebsd.org Fri May 19 22:59:57 2017 Return-Path: Delivered-To: svn-ports-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id C50F3D748E1; Fri, 19 May 2017 22:59:57 +0000 (UTC) (envelope-from madpilot@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id A044A10B8; Fri, 19 May 2017 22:59:57 +0000 (UTC) (envelope-from madpilot@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id v4JMxuM9070660; Fri, 19 May 2017 22:59:56 GMT (envelope-from madpilot@FreeBSD.org) Received: (from madpilot@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id v4JMxuBn070658; Fri, 19 May 2017 22:59:56 GMT (envelope-from madpilot@FreeBSD.org) Message-Id: <201705192259.v4JMxuBn070658@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: madpilot set sender to madpilot@FreeBSD.org using -f From: Guido Falsi Date: Fri, 19 May 2017 22:59:56 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r441277 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 19 May 2017 22:59:57 -0000 Author: madpilot Date: Fri May 19 22:59:56 2017 New Revision: 441277 URL: https://svnweb.freebsd.org/changeset/ports/441277 Log: Document net/asterisk13 and net/pjsip vulnerabilities. Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Fri May 19 22:30:16 2017 (r441276) +++ head/security/vuxml/vuln.xml Fri May 19 22:59:56 2017 (r441277) @@ -58,6 +58,90 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + asterisk -- Memory exhaustion on short SCCP packets + + + asterisk13 + 13.15.1 + + + + +

The Asterisk project reports:

+
+

A remote memory exhaustion can be triggered by sending + an SCCP packet to Asterisk system with "chan_skinny" + enabled that is larger than the length of the SCCP header + but smaller than the packet length specified in the header. + The loop that reads the rest of the packet doesn't detect + that the call to read() returned end-of-file before the + expected number of bytes and continues infinitely. The + "partial data" message logging in that tight loop causes + Asterisk to exhaust all available memory.

+
+ +
+ + http://downloads.asterisk.org/pub/security/AST-2017-004.html + + + 2017-04-13 + 2017-05-19 + +
+ + + asterisk -- Buffer Overrun in PJSIP transaction layer + + + asterisk13 + 13.15.1 + + + pjsip + 2.6_1 + + + pjsip-extsrtp + 2.6_1 + + + + +

The Asterisk project reports:

+
+

A remote crash can be triggered by sending a SIP packet + to Asterisk with a specially crafted CSeq header and a + Via header with no branch parameter. The issue is that + the PJSIP RFC 2543 transaction key generation algorithm + does not allocate a large enough buffer. By overrunning + the buffer, the memory allocation table becomes corrupted, + leading to an eventual crash.

+

The multi-part body parser in PJSIP contains a logical + error that can make certain multi-part body parts attempt + to read memory from outside the allowed boundaries. A + specially-crafted packet can trigger these invalid reads + and potentially induce a crash.

+

This issues is in PJSIP, and so the issue can be fixed + without performing an upgrade of Asterisk at all. However, + we are releasing a new version of Asterisk with the bundled + PJProject updated to include the fix.

+

If you are running Asterisk with chan_sip, this issue + does not affect you.

+
+ +
+ + http://downloads.asterisk.org/pub/security/AST-2017-002.html + http://downloads.asterisk.org/pub/security/AST-2017-003.html + + + 2017-04-12 + 2017-05-19 + +
+ Joomla3 -- SQL Injection