[AsteriskBrasil] Fwd: [asterisk-dev] Asterisk 1.2.40, 1.4.29.1, 1.6.0.24, 1.6.1.16, and 1.6.2.4 Now Available

Denis Galvão denisgalvao em gmail.com
Sexta Fevereiro 19 11:26:58 BRST 2010


--
Denis Galvão
AsteriskBrasil.org

Ajude a comunidade AsteriskBrasil.org, compre uma camiseta!
http://www.voipmania.com.br


Begin forwarded message:

> From: Asterisk Development Team <asteriskteam em digium.com>
> Date: 18 de fevereiro de 2010 21h51min58s GMT-02:00
> To: asteriskteam em digium.com
> Subject: [asterisk-dev] Asterisk 1.2.40, 1.4.29.1, 1.6.0.24,  
> 1.6.1.16, and 1.6.2.4 Now Available
> Reply-To: Asterisk Developers Mailing List <asterisk-dev em lists.digium.com 
> >
>
> The Asterisk Development Team has announced security releases for  
> the following
> versions of Asterisk:
>
> * 1.2.40
> * 1.4.29.1
> * 1.6.0.24
> * 1.6.1.16
> * 1.6.2.4
>
> These releases are available for immediate download at
> http://downloads.asterisk.org/pub/telephony/asterisk/
>
> The releases of Asterisk 1.2.40, 1.4.29.1, 1.6.0.24, 1.6.1.16, and  
> 1.6.2.4
> include documention describing a possible dialplan string injection  
> with common
> usage of the ${EXTEN} (and other expansion variables). The issue and  
> resolution
> are described in the AST-2010-002 security advisory.
>
> If you have a channel technology which can accept characters other  
> than numbers
> and letters (such as SIP) it may be possible to craft an INVITE  
> which sends data
> such as 300&Zap/g1/4165551212 which would create an additional  
> outgoing channel
> leg that was not originally intended by the dialplan programmer.
>
> Please note that this is not limited to an specific protocol or the  
> Dial()
> application.
>
> The expansion of variables into programmatically-interpreted strings  
> is a common
> behavior in many script or script-like languages, Asterisk included.  
> The ability
> for a variable to directly replace components of a command is a  
> feature, not a
> bug - that is the entire point of string expansion.
>
> However, it is often the case due to expediency or design  
> misunderstanding that
> a developer will not examine and filter string data from external  
> sources before
> passing it into potentially harmful areas of their dialplan.
>
> With the flexibility of the design of Asterisk come these risks if  
> the dialplan
> designer is not suitably cautious as to how foreign data is allowed  
> to enter the
> system unchecked.
>
> This security release is intended to raise awareness of how it is  
> possible to
> insert malicious strings into dialplans, and to advise developers to  
> read the
> best practices documents so that they may easily avoid these dangers.
>
> For more information about the details of this vulnerability, please  
> read the
> security advisory AST-2010-002, which was released at the same time  
> as this
> announcement.
>
> Asterisk 1.2.40 also contains a backported dialplan function called  
> FILTER() in
> order to allow the filtering of strings as described in the best  
> practices
> document.
>
> It should also be noted that the 1.6.x series of Asterisk had  
> release candidates
> available as versions 1.6.0.23-rc2, 1.6.1.15-rc2, and 1.6.2.3-rc2.  
> These will
> either be released as 1.6.0.25, 1.6.1.17, and 1.6.2.5, or if another  
> round of
> RC changes is necessary, those versions numbers will be used with - 
> rc1 appended.
>
> For a full list of changes in the current releases, please see the  
> ChangeLog:
>
> http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.2.40
> http://downloads.asterisk.org/pub/telephony/asterisk/ 
> ChangeLog-1.4.29.1
> http://downloads.asterisk.org/pub/telephony/asterisk/ 
> ChangeLog-1.6.0.24
> http://downloads.asterisk.org/pub/telephony/asterisk/ 
> ChangeLog-1.6.1.16
> http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.4
>
> Security advisory AST-2010-002 is available at:
>
> http://downloads.asterisk.org/pub/security/AST-2010-002.pdf
>
> The README-SERIOUSLY.bestpractices.txt document is available in the  
> top-level
> directory of your Asterisk sources, or available in all Asterisk  
> branches from
> 1.2 and up.
>
> http://svn.asterisk.org/svn/asterisk/trunk/README-SERIOUSLY.bestpractices.txt
>
> Thank you for your continued support of Asterisk!
>
> -- 
> _____________________________________________________________________
> -- Bandwidth and Colocation Provided by http://www.api-digital.com --
>
> asterisk-dev mailing list
> To UNSUBSCRIBE or update options visit:
>   http://lists.digium.com/mailman/listinfo/asterisk-dev



Mais detalhes sobre a lista de discussão AsteriskBrasil