[asterisk-dev] Asterisk 11.1.2 Now Available (Security Release)

Asterisk Development Team asteriskteam at digium.com
Thu Jan 3 11:08:00 CST 2013

The Asterisk Development Team has announced a security release for Asterisk 11,
Asterisk 11.1.2. This release addresses the security vulnerabilities reported in
AST-2012-014 and AST-2012-015, and replaces the previous version of Asterisk 11
released for these security vulnerabilities. The prior release left open a
vulnerability in res_xmpp that exists only in Asterisk 11; as such, other
versions of Asterisk were resolved correctly by the previous releases.

This release is available for immediate download at

The release of these versions resolve the following two issues:

* Stack overflows that occur in some portions of Asterisk that manage a TCP
  connection. In SIP, this is exploitable via a remote unauthenticated session;
  in XMPP and HTTP connections, this is exploitable via remote authenticated
  sessions. The vulnerabilities in SIP and HTTP were corrected in a prior
  release of Asterisk; the vulnerability in XMPP is resolved in this release.

* A denial of service vulnerability through exploitation of the device state
  cache. Anonymous calls had the capability to create devices in Asterisk that
  would never be disposed of. Handling the cachability of device states
  aggregated via XMPP is handled in this release.

These issues and their resolutions are described in the security advisories.

For more information about the details of these vulnerabilities, please read
security advisories AST-2012-014 and AST-2012-015.

For a full list of changes in the current release, please see the ChangeLog:


The security advisories are available at:

 * http://downloads.asterisk.org/pub/security/AST-2012-014.pdf
 * http://downloads.asterisk.org/pub/security/AST-2012-015.pdf

Thank you for your continued support of Asterisk - and we apologize for having
to do this twice!

More information about the asterisk-dev mailing list