[asterisk-users] Asterisk 13.13-cert3, 13.14.1, 14.3.1 Now Available (Security Release)
Asterisk Development Team
asteriskteam at digium.com
Tue Apr 4 09:55:19 CDT 2017
The Asterisk Development Team has announced security releases for
Certified Asterisk
13.13 and Asterisk 13 and 14. The available security releases are released
as versions 13.13-cert3, 13.14.1, and 14.3.1.
These releases are available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/releases
The release of these versions resolves the following security
vulnerabilities:
* AST-2017-001: Buffer overflow in CDR's set user
No size checking is done when setting the user field on a CDR. Thus,
it is possible for someone to use an arbitrarily large string and write
past
the end of the user field storage buffer. This allows the possibility of
remote
code injection.
For a full list of changes in the current releases, please see the
ChangeLogs:
http://downloads.asterisk.org/pub/telephony/certified-
asterisk/releases/ChangeLog-13.13-cert3
http://downloads.asterisk.org/pub/telephony/asterisk/
releases/ChangeLog-13.14.1
http://downloads.asterisk.org/pub/telephony/asterisk/
releases/ChangeLog-14.3.1
The security advisories are available at:
* http://downloads.asterisk.org/pub/security/AST-2017-001.pdf
Thank you for your continued support of Asterisk!
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.digium.com/pipermail/asterisk-users/attachments/20170404/8adc01c5/attachment.html>
More information about the asterisk-users
mailing list