A denial of service flaw was found in the way Skinny protocol implementation / driver of the Asterisk, an open source telephony toolkit, performed SCCP connection close. An authenticated Asterisk user (with valid SCCP ID) could use this flaw to cause asterisk executable to crash (dereference NULL pointer) by closing the connection to the Asterisk server in certain call states ("Off hook" for example). References: [1] http://downloads.asterisk.org/pub/security/AST-2012-008.html [2] https://bugs.gentoo.org/show_bug.cgi?id=418191 Upstream ticket: [3] https://issues.asterisk.org/jira/browse/ASTERISK-19905 Upstream patches: [4] http://downloads.asterisk.org/pub/security/AST-2012-008-1.8.diff (against 1.8.x branch) [5] http://downloads.asterisk.org/pub/security/AST-2012-008-10.diff (against v1.10.x branch) [6] http://downloads.asterisk.org/pub/security/AST-2012-008-1.8.11-cert.diff (against v1.8.11-cert branch)
This issue affects the versions of the asterisk package, as shipped with Fedora release of 15 and 16. Please schedule an update. -- This issue affects the version of the asterisk package, as shipped with Fedora EPEL 6. Please schedule an update.
Created asterisk tracking bugs for this issue Affects: fedora-all [bug 826478] Affects: epel-6 [bug 826479]