Bug 928774 (CVE-2013-2686) - CVE-2013-2686 asterisk: DoS in the HTTP server (AST-2013-002)
Summary: CVE-2013-2686 asterisk: DoS in the HTTP server (AST-2013-002)
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2013-2686
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 928552 928779 928780
Blocks:
TreeView+ depends on / blocked
 
Reported: 2013-03-28 12:18 UTC by Jan Lieskovsky
Modified: 2019-09-29 13:02 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2013-04-10 22:38:43 UTC
Embargoed:


Attachments (Terms of Use)

Description Jan Lieskovsky 2013-03-28 12:18:26 UTC
A denial of service flaw was found in the way Asterisk, an open-source telephony toolkit, performed processing of certain HTTP POST requests with very large Content-Length values. A remote attacker could use this flaw to cause asterisk telephony server to crash (denial of service).

Upstream advisory:
[1] http://downloads.asterisk.org/pub/security/AST-2013-002.html

Relevant upstream patches:
[2] http://downloads.asterisk.org/pub/security/AST-2013-002-1.8.diff
[3] http://downloads.asterisk.org/pub/security/AST-2013-002-10.diff
[4] http://downloads.asterisk.org/pub/security/AST-2013-002-11.diff

Comment 1 Jan Lieskovsky 2013-03-28 12:33:17 UTC
This issue affects the versions of the asterisk package, as shipped with Fedora release of 18, 17, and Fedora EPEL-6. Please schedule an update.

Comment 2 Jan Lieskovsky 2013-03-28 12:36:10 UTC
Created asterisk tracking bugs for this issue

Affects: fedora-18 [bug 928552]

Comment 3 Jan Lieskovsky 2013-03-28 12:37:43 UTC
Created asterisk tracking bugs for this issue

Affects: fedora-17 [bug 928779]
Affects: epel-6 [bug 928780]

Comment 4 Fedora Update System 2013-04-07 00:44:30 UTC
asterisk-10.12.2-1.fc17 has been pushed to the Fedora 17 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.