** Bug watch added: Debian Bug tracker #610487
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610487

** Also affects: asterisk (Debian) via
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610487
   Importance: Unknown
       Status: Unknown

** Visibility changed to: Public

** Summary changed:

- CVS-2011-0495: AST-2011-001: Asterisk: Stack based buffer overflow by forming 
an outgoing SIP request with specially-crafted caller ID information
+ CVE-2011-0495: AST-2011-001: Asterisk: Stack based buffer overflow by forming 
an outgoing SIP request with specially-crafted caller ID information

** Description changed:

  Binary package hint: asterisk
  
  All of the Asterisk packages in Ubuntu need to be patched for
  AST-2011-001, which is tentatively CVE-2011-0495.
  
  See:  http://downloads.asterisk.org/pub/security/AST-2011-001.html
  
- Although Asterisk in currently in the universe repository,  it would be
+ Although Asterisk in currently in the universe repository,  it would
  nevertheless be appreciated to get the security fix.  Debian already has
  the fix pending in their pkg-voip tree.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/705014

Title:
  CVE-2011-0495: AST-2011-001: Asterisk: Stack based buffer overflow by
  forming an outgoing SIP request with specially-crafted caller ID
  information

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to