what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2015-206

Mandriva Linux Security Advisory 2015-206
Posted Apr 27, 2015
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2015-206 - When Asterisk registers to a SIP TLS device and and verifies the server, Asterisk will accept signed certificates that match a common name other than the one Asterisk is expecting if the signed certificate has a common name containing a null byte after the portion of the common name that Asterisk expected.

tags | advisory
systems | linux, mandriva
advisories | CVE-2015-3008
SHA-256 | 0f49b40c5245b1a901652fda923ccb5d25207d1dc5ad349b0a1484d554d3794c

Mandriva Linux Security Advisory 2015-206

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2015:206
https://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : asterisk
Date : April 27, 2015
Affected: Business Server 1.0
_______________________________________________________________________

Problem Description:

Updated asterisk packages fix security vulnerability:

When Asterisk registers to a SIP TLS device and and verifies the
server, Asterisk will accept signed certificates that match a common
name other than the one Asterisk is expecting if the signed certificate
has a common name containing a null byte after the portion of the
common name that Asterisk expected (CVE-2015-3008).
_______________________________________________________________________

References:

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3008
https://advisories.mageia.org/MGASA-2015-0153.html
_______________________________________________________________________

Updated Packages:

Mandriva Business Server 1/X86_64:
b622a720acef1302469bd5fff078bf2e mbs1/x86_64/asterisk-11.17.1-1.mbs1.x86_64.rpm
32f3ead0079bae099452d98a4691f356 mbs1/x86_64/asterisk-addons-11.17.1-1.mbs1.x86_64.rpm
90e24e6c475e8c1154c9cbd82dd5e8e8 mbs1/x86_64/asterisk-devel-11.17.1-1.mbs1.x86_64.rpm
2d1c0ac11edc6c5ce2afb4063ac434cf mbs1/x86_64/asterisk-firmware-11.17.1-1.mbs1.x86_64.rpm
4849b9beec8006708ad5855f4bda264e mbs1/x86_64/asterisk-gui-11.17.1-1.mbs1.x86_64.rpm
4c75d77f3cb59c13f60138caf8156352 mbs1/x86_64/asterisk-plugins-alsa-11.17.1-1.mbs1.x86_64.rpm
0bd35fac194ecb10e3c1d482088a4097 mbs1/x86_64/asterisk-plugins-calendar-11.17.1-1.mbs1.x86_64.rpm
192c77c10296654712131a53cbd33cde mbs1/x86_64/asterisk-plugins-cel-11.17.1-1.mbs1.x86_64.rpm
ad6c52dd1a3d92ea3c164fe5f4c88d7b mbs1/x86_64/asterisk-plugins-corosync-11.17.1-1.mbs1.x86_64.rpm
f519addc0d656d249eba9b17f911244b mbs1/x86_64/asterisk-plugins-curl-11.17.1-1.mbs1.x86_64.rpm
2db55aa7dfcdb9fd3339a1c8cbb723ab mbs1/x86_64/asterisk-plugins-dahdi-11.17.1-1.mbs1.x86_64.rpm
e9fbe3134915cbaa87b8c8d6ede1b57d mbs1/x86_64/asterisk-plugins-fax-11.17.1-1.mbs1.x86_64.rpm
ced314823d11d497168e6931028500c9 mbs1/x86_64/asterisk-plugins-festival-11.17.1-1.mbs1.x86_64.rpm
f1e23eef46fb8301c6275f39cca861a1 mbs1/x86_64/asterisk-plugins-ices-11.17.1-1.mbs1.x86_64.rpm
76a7de2c6f37c36253fd0cfc2951e074 mbs1/x86_64/asterisk-plugins-jabber-11.17.1-1.mbs1.x86_64.rpm
faaaf393ce98c61d5e918241da1a61fc mbs1/x86_64/asterisk-plugins-jack-11.17.1-1.mbs1.x86_64.rpm
5a573a8de2f9088d10516139b8237bdb mbs1/x86_64/asterisk-plugins-ldap-11.17.1-1.mbs1.x86_64.rpm
0d5b1a2c39ce5297c3607cf28d00ead3 mbs1/x86_64/asterisk-plugins-lua-11.17.1-1.mbs1.x86_64.rpm
46d790164403a789519c046761f71626 mbs1/x86_64/asterisk-plugins-minivm-11.17.1-1.mbs1.x86_64.rpm
6009212f2869b027206ea239129b52e7 mbs1/x86_64/asterisk-plugins-mobile-11.17.1-1.mbs1.x86_64.rpm
1c47febb630ab5e5bed9201fbb1b5102 mbs1/x86_64/asterisk-plugins-mp3-11.17.1-1.mbs1.x86_64.rpm
3a7be951a05846f355c9f4694ed0cb53 mbs1/x86_64/asterisk-plugins-mysql-11.17.1-1.mbs1.x86_64.rpm
7d78157a89d61a1a6e90d0f40be35886 mbs1/x86_64/asterisk-plugins-ooh323-11.17.1-1.mbs1.x86_64.rpm
7da0f34159c6e8231987fb3561fbd470 mbs1/x86_64/asterisk-plugins-osp-11.17.1-1.mbs1.x86_64.rpm
ec06bbf55b66d5a2d87a453e739e2d18 mbs1/x86_64/asterisk-plugins-oss-11.17.1-1.mbs1.x86_64.rpm
cf44e06bc7b503c3723b780193058c3f mbs1/x86_64/asterisk-plugins-pgsql-11.17.1-1.mbs1.x86_64.rpm
107bfc1ff62b68c2be740d5b15a22017 mbs1/x86_64/asterisk-plugins-pktccops-11.17.1-1.mbs1.x86_64.rpm
4fe837416f637a1aee6fde6354992283 mbs1/x86_64/asterisk-plugins-portaudio-11.17.1-1.mbs1.x86_64.rpm
8b8ef562b9a312f4a75a1801beeb6770 mbs1/x86_64/asterisk-plugins-radius-11.17.1-1.mbs1.x86_64.rpm
7e872343fdab26745bb04c86e3a76a2f mbs1/x86_64/asterisk-plugins-saycountpl-11.17.1-1.mbs1.x86_64.rpm
ec94405ec2bbbb96518f9c9602de16cb mbs1/x86_64/asterisk-plugins-skinny-11.17.1-1.mbs1.x86_64.rpm
4a77b93657631f73d7626e5152359b9b mbs1/x86_64/asterisk-plugins-snmp-11.17.1-1.mbs1.x86_64.rpm
54be929e9a936f402098af8a0685697f mbs1/x86_64/asterisk-plugins-speex-11.17.1-1.mbs1.x86_64.rpm
38db51cce7a67dcb4707ed4bd545e6e5 mbs1/x86_64/asterisk-plugins-sqlite-11.17.1-1.mbs1.x86_64.rpm
25399ec97a84ceba4e8dcd16141f2c0a mbs1/x86_64/asterisk-plugins-tds-11.17.1-1.mbs1.x86_64.rpm
8f026b239dc37c2d274caa30e89fd9b1 mbs1/x86_64/asterisk-plugins-unistim-11.17.1-1.mbs1.x86_64.rpm
e3129548c8ffec6686a0dfcfa59aad25 mbs1/x86_64/asterisk-plugins-voicemail-11.17.1-1.mbs1.x86_64.rpm
ec8983601ea02f8120ce15211733dafa mbs1/x86_64/asterisk-plugins-voicemail-imap-11.17.1-1.mbs1.x86_64.rpm
b893a384ece6c9512c940dee2750617d mbs1/x86_64/asterisk-plugins-voicemail-plain-11.17.1-1.mbs1.x86_64.rpm
ec404cef5055da70019f0013b2724091 mbs1/x86_64/lib64asteriskssl1-11.17.1-1.mbs1.x86_64.rpm
3eab65f3e42f04794aa882f3a2c62779 mbs1/SRPMS/asterisk-11.17.1-1.mbs1.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

https://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFVPdlBmqjQ0CJFipgRAhRnAJ0WzixIi5UvTH8Cm3gCAVRN9Y9rTgCgh8ag
wfZFBXBaxjDiHo57IlOXga8=
=l4+z
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close