http://www.mandriva.com/en/
______________________________
Package : asterisk
Date : July 11, 2014
Affected: Business Server 1.0
______________________________
Problem Description:
Multiple vulnerabilities has been discovered and corrected in asterisk:
Asterisk Open Source 11.x before 11.10.1 and 12.x before 12.3.1 and
Certified Asterisk 11.6 before 11.6-cert3 allows remote authenticated
Manager users to execute arbitrary shell commands via a MixMonitor
action (CVE-2014-4046).
Asterisk Open Source 1.8.x before 1.8.28.1, 11.x before 11.10.1, and
12.x before 12.3.1 and Certified Asterisk 1.8.15 before 1.8.15-cert6
and 11.6 before 11.6-cert3 allows remote attackers to cause a denial of
service (connection consumption) via a large number of (1) inactive or
(2) incomplete HTTP connections (CVE-2014-4047).
The updated packages has been upgraded to the 11.11.0 version which
is not vulnerable to these issues.
______________________________
References:
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://downloads.asterisk.org/
http://downloads.asterisk.org/
http://downloads.asterisk.org/
______________________________
Updated Packages:
Mandriva Business Server 1/X86_64:
e937dd2a5d9f6a67df27e4dd645439
a85725b66368b25457533a4c3e8770
ffdc1c8d1f292326e777200506b29f
1b4fe1e6f4cfc0405cd9f43bc942ed
f594da1396d28e51c6d784fb468f61
171e3ff869f721589b7a48b0081c6a
1f48820459d336ae4dd483c2a65762
7b882ebbbc3417bf322b9234c623f7
d7ce1a6e8eba5895fb08803c372eb2
c12c986e12a9ae1acefd1353f1c1c2
9afd8b3c8eb7f5f8a0575b49e25cf6
945fbfc96c1c86eea0f6748e23793b
65be6c1cda3dcf1c5a6b2522a88ce6
ca4d24b7d09bb0dd8f09fbd57c4e2e
871cbd9c538462b999ea0ab4e706ec
1c267d79e68ec6e6a446088dc21372
3a67da30600e5d3990b78160e06716
12cd5d29582b4b876136a1cfa61002
15c973274e70c0fe71e56d92b43f8f
a83fcc142030a10ff5c4bb88cb1052
a72a75d828dbfca4eeedb7435bdc63
d96a752e43350807ac4ff68b746650
4879f8e873b4ac4e422edc659cabad
2a92bc419c61f00040c318d237145c
856119d1c534646d70bada4e47a3bb
e30513f32093f40e53cc4cddc4b5d3
8474c401e4a99e2ec78fed586ea29d
e81f8d782fc2b8b5cc46af2f74fc0f
e0b4ec334a8d767854491a3c60b45f
617c199316459e7cbda7967f082166
dde610fd41678c059933ccb323a250
d4f765ec860ebdf55dbb518efd2b84
e31ed77900b96e46f9c2a42f051318
3fdbeb88ba4e98996da0c9d81ebea3
350710fb047822f4c324b5ea59e8d7
81dcd84e21f072233117a229ea3bc5
2b101c552b57f690a446df81133907
dd8c065364100baf3b96e934e20bfe
85f0f40e43c629c88a29ccdd20c71b
e9ae8fa821f0eeacf8eb22e2930a2a
9a59a28dedab183fc986073f01f134
______________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
______________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
Komentarų nėra:
Rašyti komentarą