Bug 1144319 (CVE-2014-6610)

Summary: CVE-2014-6610 asterisk: Remote crash when handling out of call message in certain dialplan configurations [AST-2014-010]
Product: [Other] Security Response Reporter: Vasyl Kaigorodov <vkaigoro>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: itamar, jeff, lmadsen, rbryant
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: asterisk 11.12.1 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-08-22 06:31:32 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1144320    
Bug Blocks:    

Description Vasyl Kaigorodov 2014-09-19 08:45:57 UTC
    Description  When an out of call message - delivered by either the SIP    
                 or PJSIP channel driver or the XMPP stack - is handled in    
                 Asterisk, a crash can occur if the channel servicing the     
                 message is sent into the ReceiveFax dialplan application     
                 while using the res_fax_spandsp module.                      
                                                                              
                 Note that this crash does not occur when using the           
                 res_fax_digium module.                                       
                                                                              
                 While this crash technically occurs due to a configuration   
                 issue, as attempting to receive a fax from a channel driver  
                 that only contains textual information will never succeed,   
                 the likelihood of having it occur is sufficiently high as    
                 to warrant this advisory.

Upstream patch: http://downloads.asterisk.org/pub/security/AST-2014-010-11.diff
Additional info:
https://issues.asterisk.org/jira/browse/ASTERISK-24301
http://downloads.digium.com/pub/security/AST-2014-010.html

Comment 1 Vasyl Kaigorodov 2014-09-19 08:46:15 UTC
Created asterisk tracking bugs for this issue:

Affects: fedora-all [bug 1144320]