
====================================================================

                             CERT-Renater

                 Note d'Information No. 2018/VULN206
_____________________________________________________________________

DATE                : 12/06/2018

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S):  Systems running Asterisk Open Source versions
                            prior to 13.21.1, 14.7.7, 15.4.1,
                      Certified Asterisk versions prior to  13.18-cert4,
                             13.21-cert2 .

=====================================================================
http://downloads.asterisk.org/pub/security/AST-2018-007.html
http://downloads.asterisk.org/pub/security/AST-2018-008.html
_____________________________________________________________________


Asterisk Project Security Advisory - AST-2018-007



Product                Asterisk

Summary                Infinite loop when reading iostreams

Nature of Advisory     Denial of Service

Susceptibility         Remote Authenticated Sessions

Severity               Critical

Exploits Known         No

Reported On            April 16, 2018

Reported By            Sean Bright

Posted On              June 11, 2018

Last Updated On        June 12, 2018

Advisory Contact       Kevin Harwell <kharwell AT digium DOT com>

CVE Name               CVE-2018-12228



Description
   

When connected to Asterisk via TCP/TLS if the client abruptly
disconnects, or sends a specially crafted message then Asterisk
gets caught in an infinite loop while trying to read the data
stream. Thus rendering the system as unusable.



Resolution
  

Stricter error checking is now done when iostreams encounters
a problem. When an error occurs during reading it is now properly
handled, and continued reading is appropriately stopped.



                       Affected Versions

Product                   Release Series

Asterisk Open Source      15.x                All Releases


  
                        Corrected In

Product                   Release

Asterisk Open Source      15.4.1


                            Patches

SVN URL                            Revision

http://downloads.asterisk.org/pub/security/AST-2018-007-15.diff

Asterisk 15


  
Links    https://issues.asterisk.org/jira/browse/ASTERISK-27807


Asterisk Project Security Advisories are posted at
http://www.asterisk.org/security

This document may be superseded by later versions; if so,
the latest version will be posted at
http://downloads.digium.com/pub/security/AST-2018-007.pdf
and http://downloads.digium.com/pub/security/AST-2018-007.html


Revision History

Date                       Editor                      Revisions
Made       
April 25, 2018      Kevin Harwell       Initial Revision
June 12, 2018      Kevin Harwell       Added CVE


Asterisk Project Security Advisory - AST-2018-007
Copyright © 2018 Digium, Inc. All Rights Reserved.
Permission is hereby granted to distribute and publish this
advisory in its original, unaltered form.

_____________________________________________________________________

Asterisk Project Security Advisory - AST-2018-008

Product                       Asterisk

Summary               PJSIP endpoint presence disclosure when using ACL

Nature of Advisory    Unauthorized data disclosure

Susceptibility        Remote Unauthenticated Sessions

Severity              Minor

Exploits Known        No
 
Reported On           April 19, 2018

Reported By           John

Posted On             June 11, 2018

Last Updated On       June 12, 2018

Advisory Contact      Rmudgett AT digium DOT com

CVE Name              CVE-2018-12227



Description
  

When endpoint specific ACL rules block a SIP request they
respond with a 403 forbidden. However, if an endpoint is not
identified then a 401 unauthorized response is sent. This
vulnerability just discloses which requests hit a defined
endpoint. The ACL rules cannot be bypassed to gain access
to the disclosed endpoints.


Resolution
  

Endpoint specific ACL rules now respond with a 401 challenge
which is the same as if an endpoint were not identified.
An alternate is to use global ACL rules to avoid the
information disclosure.


                       Affected Versions

Product                    Release Series  
Asterisk Open Source       13.x            13.10.0 and later

Asterisk Open Source       14.x            All releases

Asterisk Open Source       15.x            All releases

Certified Asterisk         13.18           All releases

Certified Asterisk         13.21           All releases


                       Corrected In

Product                    Release

Asterisk Open Source       13.21.1, 14.7.7, 15.4.1

Certified Asterisk         13.18-cert4, 13.21-cert2


                        Patches

SVN URL                    Revision

http://downloads.asterisk.org/pub/security/AST-2018-008-13.diff
Asterisk 13

http://downloads.asterisk.org/pub/security/AST-2018-008-14.diff
Asterisk 14

http://downloads.asterisk.org/pub/security/AST-2018-008-15.diff
Asterisk 15

http://downloads.asterisk.org/pub/security/AST-2018-008-13.18.diff
Certified Asterisk 13.18

http://downloads.asterisk.org/pub/security/AST-2018-008-13.21.diff
Certified Asterisk 13.21



Links        https://issues.asterisk.org/jira/browse/ASTERISK-27818


Asterisk Project Security Advisories are posted at
http://www.asterisk.org/security

This document may be superseded by later versions; if so, the
latest version will be posted at
http://downloads.digium.com/pub/security/AST-2018-008.pdf
and http://downloads.digium.com/pub/security/AST-2018-008.html


Revision History

Date             Editor             Revisions Made

May 1, 2018      Richard Mudgett    Initial revision

June 11, 2018    Richard Mudgett    Added Certified Asterisk 13.21

June 12, 2018    Kevin Harwell      Added CVE and issue link



===============================================================
+ CERT-RENATER            | tel : 01-53-94-20-44              +
+ 23 - 25 Rue Daviel      | fax : 01-53-94-20-41              +
+ 75013 Paris             | email: cert@support.renater.fr    +
===============================================================

--------------080007010604010000080507

<html>
  <head>
    <meta http-equiv="content-type" content="text/html;
      charset=ISO-8859-1">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    <div style="font-family: arial, helvetica, sans-serif; font-size:
      12pt; color: #000000">
      <div><tt>====================================================================<br>
          <br>
          &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; CERT-Renater<br>
          <br>
          &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Note d'Information No. 2018/VULN206<br>
_____________________________________________________________________<br>
          <br>
          DATE&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : 12/06/2018<br>
          <br>
          HARDWARE PLATFORM(S): /<br>
          <br>
          OPERATING SYSTEM(S):&nbsp; Systems running Asterisk Open Source
          versions <br>
          &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; prior to 13.21.1, 14.7.7, 15.4.1,<br>
          &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Certified Asterisk versions prior to&nbsp;
          13.18-cert4, <br>
          &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 13.21-cert2 .<br>
          <br>
=====================================================================<br>
          <a class="moz-txt-link-freetext"
            href="http://downloads.asterisk.org/pub/security/AST-2018-007.html">http://downloads.asterisk.org/pub/security/AST-2018-007.html</a><br>
          <a class="moz-txt-link-freetext"
            href="http://downloads.asterisk.org/pub/security/AST-2018-008.html">http://downloads.asterisk.org/pub/security/AST-2018-008.html</a><br>
_____________________________________________________________________<br>
          <br>
          <br>
          Asterisk Project Security Advisory - AST-2018-007<br>
          <br>
          <br>
          <br>
          Product&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Asterisk<br>
          <br>
          Summary&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Infinite loop when reading iostreams<br>
          <br>
          Nature of Advisory&nbsp;&nbsp;&nbsp;&nbsp; Denial of Service<br>
          <br>
          Susceptibility&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Remote Authenticated Sessions<br>
          <br>
          Severity&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Critical<br>
          <br>
          Exploits Known&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; No<br>
          <br>
          Reported On&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; April 16, 2018<br>
          <br>
          Reported By&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Sean Bright<br>
          <br>
          Posted On&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; June 11, 2018<br>
          <br>
          Last Updated On&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; June 12, 2018<br>
          <br>
          Advisory Contact&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Kevin Harwell &lt;kharwell AT digium
          DOT com&gt;<br>
          <br>
          CVE Name&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; CVE-2018-12228<br>
          <br>
          <br>
          <br>
          Description<br>
          &nbsp; &nbsp;<br>
          <br>
          When connected to Asterisk via TCP/TLS if the client abruptly<br>
          disconnects, or sends a specially crafted message then
          Asterisk<br>
          gets caught in an infinite loop while trying to read the data<br>
          stream. Thus rendering the system as unusable.<br>
          <br>
          <br>
          <br>
          Resolution<br>
          &nbsp;&nbsp; <br>
          <br>
          Stricter error checking is now done when iostreams encounters<br>
          a problem. When an error occurs during reading it is now
          properly<br>
          handled, and continued reading is appropriately stopped.<br>
          <br>
          <br>
          <br>
          &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Affected Versions<br>
          <br>
          Product&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Release Series<br>
          <br>
          Asterisk Open Source&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 15.x&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; All Releases<br>
          <br>
          <br>
          &nbsp;&nbsp; <br>
          &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Corrected In<br>
          <br>
          Product&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Release<br>
          <br>
          Asterisk Open Source&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 15.4.1<br>
          <br>
          <br>
          &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Patches<br>
          <br>
          SVN URL&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Revision<br>
          <br>
          <a class="moz-txt-link-freetext"
            href="http://downloads.asterisk.org/pub/security/AST-2018-007-15.diff">http://downloads.asterisk.org/pub/security/AST-2018-007-15.diff</a><br>
          <br>
          Asterisk 15<br>
          <br>
          <br>
          &nbsp;&nbsp; <br>
          Links&nbsp;&nbsp;&nbsp; <a class="moz-txt-link-freetext"
            href="https://issues.asterisk.org/jira/browse/ASTERISK-27807">https://issues.asterisk.org/jira/browse/ASTERISK-27807</a><br>
          <br>
          <br>
          Asterisk Project Security Advisories are posted at<br>
          <a class="moz-txt-link-freetext"
            href="http://www.asterisk.org/security">http://www.asterisk.org/security</a><br>
          <br>
          This document may be superseded by later versions; if so,<br>
          the latest version will be posted at<br>
          <a class="moz-txt-link-freetext"
            href="http://downloads.digium.com/pub/security/AST-2018-007.pdf">http://downloads.digium.com/pub/security/AST-2018-007.pdf</a><br>
          and <a class="moz-txt-link-freetext"
            href="http://downloads.digium.com/pub/security/AST-2018-007.html">http://downloads.digium.com/pub/security/AST-2018-007.html</a><br>
          <br>
          <br>
          Revision History<br>
          <br>
          Date&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Editor&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
          Revisions Made&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <br>
          April 25, 2018&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Kevin Harwell&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Initial Revision<br>
          June 12, 2018&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Kevin Harwell&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Added CVE<br>
          <br>
          <br>
          Asterisk Project Security Advisory - AST-2018-007<br>
          Copyright &copy; 2018 Digium, Inc. All Rights Reserved.<br>
          Permission is hereby granted to distribute and publish this<br>
          advisory in its original, unaltered form.<br>
          <br>
_____________________________________________________________________<br>
          <br>
          Asterisk Project Security Advisory - AST-2018-008<br>
          <br>
          Product&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Asterisk<br>
          <br>
          Summary&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; PJSIP endpoint presence disclosure when
          using ACL<br>
          <br>
          Nature of Advisory&nbsp;&nbsp;&nbsp; Unauthorized data disclosure<br>
          <br>
          Susceptibility&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Remote Unauthenticated Sessions<br>
          <br>
          Severity&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Minor<br>
          <br>
          Exploits Known&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; No<br>
          &nbsp;<br>
          Reported On&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; April 19, 2018<br>
          <br>
          Reported By&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; John<br>
          <br>
          Posted On&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; June 11, 2018<br>
          <br>
          Last Updated On&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; June 12, 2018<br>
          <br>
          Advisory Contact&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Rmudgett AT digium DOT com<br>
          <br>
          CVE Name&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; CVE-2018-12227<br>
          <br>
          <br>
          <br>
          Description<br>
          &nbsp;&nbsp; <br>
          <br>
          When endpoint specific ACL rules block a SIP request they<br>
          respond with a 403 forbidden. However, if an endpoint is not<br>
          identified then a 401 unauthorized response is sent. This<br>
          vulnerability just discloses which requests hit a defined<br>
          endpoint. The ACL rules cannot be bypassed to gain access<br>
          to the disclosed endpoints.<br>
          <br>
          <br>
          Resolution<br>
          &nbsp;&nbsp; <br>
          <br>
          Endpoint specific ACL rules now respond with a 401 challenge<br>
          which is the same as if an endpoint were not identified.<br>
          An alternate is to use global ACL rules to avoid the<br>
          information disclosure.<br>
          <br>
          <br>
          &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Affected Versions<br>
          <br>
          Product&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Release Series&nbsp;&nbsp; <br>
          Asterisk Open Source&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 13.x&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 13.10.0 and later<br>
          <br>
          Asterisk Open Source&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 14.x&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; All releases<br>
          <br>
          Asterisk Open Source&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 15.x&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; All releases<br>
          <br>
          Certified Asterisk&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 13.18&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; All releases<br>
          <br>
          Certified Asterisk&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 13.21&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; All releases<br>
          <br>
          <br>
          &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Corrected In<br>
          <br>
          Product&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Release<br>
          <br>
          Asterisk Open Source&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 13.21.1, 14.7.7, 15.4.1<br>
          <br>
          Certified Asterisk&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 13.18-cert4, 13.21-cert2<br>
          <br>
          <br>
          &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Patches<br>
          <br>
          SVN URL&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Revision<br>
          <br>
          <a class="moz-txt-link-freetext"
            href="http://downloads.asterisk.org/pub/security/AST-2018-008-13.diff">http://downloads.asterisk.org/pub/security/AST-2018-008-13.diff</a><br>
          Asterisk 13<br>
          <br>
          <a class="moz-txt-link-freetext"
            href="http://downloads.asterisk.org/pub/security/AST-2018-008-14.diff">http://downloads.asterisk.org/pub/security/AST-2018-008-14.diff</a><br>
          Asterisk 14<br>
          <br>
          <a class="moz-txt-link-freetext"
            href="http://downloads.asterisk.org/pub/security/AST-2018-008-15.diff">http://downloads.asterisk.org/pub/security/AST-2018-008-15.diff</a><br>
          Asterisk 15<br>
          <br>
          <a class="moz-txt-link-freetext"
href="http://downloads.asterisk.org/pub/security/AST-2018-008-13.18.diff">http://downloads.asterisk.org/pub/security/AST-2018-008-13.18.diff</a><br>
          Certified Asterisk 13.18<br>
          <br>
          <a class="moz-txt-link-freetext"
href="http://downloads.asterisk.org/pub/security/AST-2018-008-13.21.diff">http://downloads.asterisk.org/pub/security/AST-2018-008-13.21.diff</a><br>
          Certified Asterisk 13.21<br>
          <br>
          <br>
          <br>
          Links&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a class="moz-txt-link-freetext"
            href="https://issues.asterisk.org/jira/browse/ASTERISK-27818">https://issues.asterisk.org/jira/browse/ASTERISK-27818</a><br>
          <br>
          <br>
          Asterisk Project Security Advisories are posted at<br>
          <a class="moz-txt-link-freetext"
            href="http://www.asterisk.org/security">http://www.asterisk.org/security</a><br>
          <br>
          This document may be superseded by later versions; if so, the<br>
          latest version will be posted at<br>
          <a class="moz-txt-link-freetext"
            href="http://downloads.digium.com/pub/security/AST-2018-008.pdf">http://downloads.digium.com/pub/security/AST-2018-008.pdf</a><br>
          and <a class="moz-txt-link-freetext"
            href="http://downloads.digium.com/pub/security/AST-2018-008.html">http://downloads.digium.com/pub/security/AST-2018-008.html</a><br>
          <br>
          <br>
          Revision History<br>
          <br>
          Date&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Editor&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Revisions Made<br>
          <br>
          May 1, 2018&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Richard Mudgett&nbsp;&nbsp;&nbsp; Initial revision<br>
          <br>
          June 11, 2018&nbsp;&nbsp;&nbsp; Richard Mudgett&nbsp;&nbsp;&nbsp; Added Certified Asterisk
          13.21<br>
          <br>
          June 12, 2018&nbsp;&nbsp;&nbsp; Kevin Harwell&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Added CVE and issue link<br>
          <br>
          <br>
          <br>
===============================================================<br>
          + CERT-RENATER&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; | tel : 01-53-94-20-44&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
          +<br>
          + 23 - 25 Rue Daviel&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; | fax : 01-53-94-20-41&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
          +<br>
          + 75013 Paris&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; | email: <a
            class="moz-txt-link-abbreviated"
            href="mailto:cert@support.renater.fr">cert@support.renater.fr</a>&nbsp;&nbsp;&nbsp;

          +<br>
===============================================================</tt> <br>
      </div>
    </div>
  </body>
</html>

--------------080007010604010000080507--

