Bug 1306617 (CVE-2016-2232)

Summary: CVE-2016-2232 asterisk: remote crash vulnerability when receiving UDPTL FAX data (AST-2016-003)
Product: [Other] Security Response Reporter: Martin Prpič <mprpic>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED UPSTREAM QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: g.devel, itamar, jsmith.fedora, lmadsen, rbryant
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: asterisk 11.21.1, asterisk 13.7.1 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-07-12 13:04:03 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1306619, 1306620    
Bug Blocks:    

Description Martin Prpič 2016-02-11 13:06:02 UTC
The following flaw was found in Asterisk:

If no UDPTL packets are lost there is no problem. However, a lost packet causes Asterisk to use the available error correcting redundancy packets. If those redundancy packets have zero length then Asterisk uses an uninitialized buffer pointer and length value which can cause invalid memory accesses later when the packet is copied.

External References:

http://downloads.asterisk.org/pub/security/AST-2016-003.html

Comment 1 Martin Prpič 2016-02-11 13:09:33 UTC
Created asterisk tracking bugs for this issue:

Affects: fedora-all [bug 1306619]
Affects: epel-6 [bug 1306620]

Comment 2 Jared Smith 2016-02-12 15:28:23 UTC
This has been corrected in Rawhide with the 13.7.2 release, and also pushed to the Fedora 23 and Fedora 22 testing-updates repositories.

I'm working on updating the EPEL 6 package now.

Comment 3 Andrej Nemec 2016-02-16 08:12:35 UTC
CVE assignment information from upstream:

http://downloads.asterisk.org/pub/security/AST-2016-003.html

Comment 4 Product Security DevOps Team 2019-07-12 13:04:03 UTC
ARRAY(0x55ab819dec60)