Un vulnerabilidad en el canal IAX2 cuando se permiten llamadas sin autenticar y varios bugfixes han provocado estas dos nuevas releases. Incluso se ha generado un ASA (Asterisk Security Advisory) advirtiendo de esta vulnerabilidad. A actualizar se ha dicho! Anuncio oficial:
The Asterisk development team has released Asterisk versions 1.2.23 and
1.4.9.These releases contain bug fixes, including one for a security vulnerability.
The vulnerability is a potential Denial of Service attack when the Asterisk
IAX2 channel driver is configured to allow unauthenticated calls.We have released an Asterisk Security Advisory for the vulnerability. The
current version of the advisory can be downloaded from the ftp site.http://ftp.digium.com/pub/asa/ASA-2007-018.pdf
* Affected systems include all Asterisk installations running an affected version
that allow unauthenticated IAX2 calls. Affected open source versions include
1.2.20 through 1.2.22, and 1.4.5 through 1.4.8.All users that have systems that meet the criteria listed above should
upgrade as soon as possible.Thank you very much for your support.
Se recomienda encarecidamente que todos los usuarios de las versiones afectadas actualicen.
POdéis descargarlo donde siempre: http://ftp.digium.com/pub/asterisk/