[Asterisk-Security] Multiple Vulnerabilities in Asterisk 1.2.10 (Fixed in 1.2.11)

Tzafrir Cohen tzafrir.cohen at xorcom.com
Sun Aug 27 02:14:50 MST 2006


On Sun, Aug 27, 2006 at 10:05:11AM +0200, Matt Riddell (IT) wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Tzafrir Cohen wrote:
> > Note that the issue "exists in the code" in 1.2.11 just as it has
> > existed in 1.2.10 and before. And has much larger potential impact (as
> > usual) if Asterisk is run as root.
> 
> Can you expand a little?   Is 1.2.11 still vulnerable?

Right. If you use something like:

  Record(${CALLERIDNAME})

then yes, your Asterisk installation is still vulnerable.
BTW, even in such a stupid case, 

  Record(rec-${CALLERIDNAME})

helps.

Unless I misread the advisory.

-- 
Tzafrir Cohen         sip:tzafrir at local.xorcom.com
icq#16849755          iax:tzafrir at local.xorcom.com
+972-50-7952406          jabber:tzafrir at jabber.org
tzafrir.cohen at xorcom.com     http://www.xorcom.com


More information about the Asterisk-Security mailing list