Remotely exploitable denial of service (crash) has been reported and corrected in Asterisk. From the upstream advisory (AST-2010-0001): "An attacker attempting to negotiate T.38 over SIP can remotely crash Asterisk by modifying the FaxMaxDatagram field of the SDP to contain either a negative or exceptionally large value. The same crash occurs when the FaxMaxDatagram field is omitted from the SDP as well." Upstream advisory: http://downloads.asterisk.org/pub/security/AST-2010-001.pdf Patches: http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.0.diff (v1.6.0) http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.1.diff (v1.6.1) http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.2.diff (v1.6.2) Credit / Reported by: issues.asterisk.org users bklang and elsto
This issue affects latest versions of the asterisk package, as shipped within Fedora release of 11 (asterisk-1.6.1.12-1.fc11) and 12 (asterisk-1.6.1.12-1.fc12). Please fix.
https://bugzilla.redhat.com/show_bug.cgi?id=561332 and https://bugzilla.redhat.com/show_bug.cgi?id=566829 appear to be duplicates.
asterisk-1.6.2.5-1.fc13 has been submitted as an update for Fedora 13. http://admin.fedoraproject.org/updates/asterisk-1.6.2.5-1.fc13
asterisk-1.6.1.17-1.fc12 has been submitted as an update for Fedora 12. http://admin.fedoraproject.org/updates/asterisk-1.6.1.17-1.fc12
*** Bug 566829 has been marked as a duplicate of this bug. ***
asterisk-1.6.1.17-1.fc11 has been submitted as an update for Fedora 11. http://admin.fedoraproject.org/updates/asterisk-1.6.1.17-1.fc11
asterisk-1.6.1.17-1.fc11 has been pushed to the Fedora 11 stable repository. If problems still persist, please make note of it in this bug report.
asterisk-1.6.1.17-1.fc12 has been pushed to the Fedora 12 stable repository. If problems still persist, please make note of it in this bug report.