Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2018.3565 Asterisk: Remote crash vulnerability DNS SRV and NAPTR lookups 15 November 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Asterisk Publisher: Asterisk Operating System: Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2018-19278 Original Bulletin: http://downloads.asterisk.org/pub/security/AST-2018-010.html - --------------------------BEGIN INCLUDED TEXT-------------------- Asterisk Project Security Advisory - AST-2018-010 Product Asterisk Summary Remote crash vulnerability DNS SRV and NAPTR lookups Nature of Advisory Denial Of Service Susceptibility Remote Unauthenticated Sessions Severity Moderate Exploits Known No Reported On October 23, 2018 Reported By Jan Hoffmann Posted On November 14,2018 Last Updated On November 14, 2018 Advisory Contact gjoseph AT digium DOT com CVE Name CVE-2018-19278 Description There is a buffer overflow vulnerability in dns_srv and dns_naptr functions of Asterisk that allows an attacker to crash Asterisk via a specially crafted DNS SRV or NAPTR response. The attacker's request causes Asterisk to segfault and crash. Resolution Upgrade Asterisk to a fixed version. Affected Versions Product Release Series Asterisk Open Source 15.x All releases Asterisk Open Source 16.x All releases Corrected In Product Release Asterisk Open Source 15.6.2 Asterisk Open Source 16.0.1 Patches http://downloads.asterisk.org/pub/security/AST-2018-010-15.diff Asterisk 15 http://downloads.asterisk.org/pub/security/AST-2018-010-16.diff Asterisk 16 Links https://issues.asterisk.org/jira/browse/ASTERISK-28127 Asterisk Project Security Advisories are posted at http://www.asterisk.org/ security This document may be superseded by later versions; if so, the latest version will be posted at http://downloads.digium.com/pub/security/AST-2018-010.pdf and http://downloads.digium.com/pub/security/AST-2018-010.html Revision History Date Editor Revisions Made October 25, 2018 George Joseph Initial revision November 14, 2018 George Joseph Updated with CVE Asterisk Project Security Advisory - AST-2018-010 Copyright 2018 Digium, Inc. All Rights Reserved. Permission is hereby granted to distribute and publish this advisory in its original, unaltered form. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBW+ylKGaOgq3Tt24GAQix0xAA2S3Jd3dFW4OQPq6NC3l2REacotD7Mtuv PC3A2lddeXeulmv7NKdE22MoaD+pEkiGsLyWzdevawUQam5wSz/S85bnv8PC1gsg KURvvPKPxKACErSGHc/NpPR5m7W+GWbGS2PH2+764jVym7AoG1zeiSoTJP6/kLqL 5ygnRwknsoiVtENWBocmy2UK8U7fC4UivX/1dMi94uUPzQ/3wak1oU8CV1Xz7HtG 5tClTMrQWQUkzFFjp31+sMEwhFt/PUmvGMorOIXswm/WtTZsM1HtxmhZH9rszIz6 hsTYW+ElLBG/wfjjdFQNdBpPtugfUnNxZhMVzYGW05QW2ERMVnwsu6kuQ4iZvC2q GhyhobD2RYeZaxscmZPp6IJxv++FT4nVkCiT1f/4ekupfDkIi5gWsm8o8PGE7trv HFK7eyGX6MpIR3YJyCVzmj0e7TpKhZVD2K7qCjsev9Mr9hdQQg2SIry3GtaWdizA yiI+rwu5hltfA3jEzZoqzB38MbL9W11udqXK/1gn5iE3wQyvAyBUKxB5x6fK0rNH 6Rbpppli4FX+c7KGkeENolEnDzTIkCt1lXRhFLW5UBS4fJRCmoEMM5u1dfA3eZnn 9zT61Ip/sjrI2DhOR8ZhFNgFkaX0b6kidtcAyc6/k5/j7/QD/pbDdOQQSNqGL1fz BOIHsOoQPb8= =gVMw -----END PGP SIGNATURE-----