[asterisk-dev] Asterisk,, and Now Available (Security Release)

Asterisk Development Team asteriskteam at digium.com
Thu Jun 23 15:14:19 CDT 2011

The Asterisk Development Team has announced the release of Asterisk versions,, and, which are security releases.

These releases are available for immediate download at

The release of Asterisk,, and resolves several 
as outlined below:

* AST-2011-008: If a remote user sends a SIP packet containing a null,
   Asterisk assumes available data extends past the null to the
   end of the packet when the buffer is actually truncated when
   copied.  This causes SIP header parsing to modify data past
   the end of the buffer altering unrelated memory structures.
   This vulnerability does not affect TCP/TLS connections.
   -- Resolved in and

* AST-2011-009: A remote user sending a SIP packet containing a Contact 
   with a missing left angle bracket (<) causes Asterisk to
   access a null pointer.
   -- Resolved in

* AST-2011-010: A memory address was inadvertently transmitted over the
   network via IAX2 via an option control frame and the remote party 
would try
   to access it.
   -- Resolved in,, and

The issues and resolutions are described in the AST-2011-008, 
AST-2011-009, and
AST-2011-010 security advisories.

For more information about the details of these vulnerabilities, please read
the security advisories AST-2011-008, AST-2011-009, and AST-2011-010, 
which were
released at the same time as this announcement.

For a full list of changes in the current releases, please see the 


Security advisories AST-2011-008, AST-2011-009, and AST-2011-010 are 


Thank you for your continued support of Asterisk!

More information about the asterisk-dev mailing list