You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa asterisk

Sigurnosni nedostatak programskog paketa asterisk

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LDE

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512

– ————————————————————————-
Debian Security Advisory DSA-3990-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
October 03, 2017 https://www.debian.org/security/faq
– ————————————————————————-

Package : asterisk
CVE ID : CVE-2017-14603

Klaus-Peter Junghann discovered that insufficient validation of RTCP
packets in Asterisk may result in an information leak. Please see the
upstream advisory at
http://downloads.asterisk.org/pub/security/AST-2017-008.html for
additional details.

For the oldstable distribution (jessie), this problem has been fixed
in version 1:11.13.1~dfsg-2+deb8u4.

For the stable distribution (stretch), this problem has been fixed in
version 1:13.14.1~dfsg-2+deb9u2.

We recommend that you upgrade your asterisk packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
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=TuUV
—–END PGP SIGNATURE—–

AutorVlatka Misic
Cert idNCERT-REF-2017-10-0023-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa ocaml

Otkriveni su sigurnosni nedostaci u programskom paketu ocaml za operacijski sustav Ubuntu. Otkriveni nedostaci potencijalnim napadačima omogućuju rušenje servisa, otkrivanje...

Close