|
Message-ID: <4EE1F864.7040609@redhat.com> Date: Fri, 09 Dec 2011 13:00:36 +0100 From: Jan Lieskovsky <jlieskov@...hat.com> To: "Steven M. Christey" <coley@...us.mitre.org> CC: oss-security@...ts.openwall.com, Asterisk Development Team <asteriskteam@...ium.com> Subject: CVE Request -- Asterisk -- AST-2011-013 and AST-2011-014 Hello Kurt, Steve, vendors, the following two security flaws have been recently fixed: http://www.asterisk.org/node/51693 in Asterisk: 1) AST-2011-013 Possible to enumerate SIP usernames when general and user/peer NAT settings differed An information disclosure flaw was found in the way Asterisk handled UDP requests in configurations using network address translation (NAT) for the SIP protocol. When the general configuration file section and user / peer configuration file section NAT settings differed, it was possible to enumerate SIP usernames if the request was sent to different port as that, specified in the Via header. References: [1] http://www.asterisk.org/node/51693 [2] http://downloads.asterisk.org/pub/security/AST-2011-013.pdf [3] http://lists.digium.com/pipermail/asterisk-dev/2011-November/thread.html#52191 [4] https://bugs.gentoo.org/show_bug.cgi?id=394095 [5] https://bugzilla.redhat.com/show_bug.cgi?id=765773 Upstream bug report: [6] https://issues.asterisk.org/jira/browse/ASTERISK-18862 Upstream review board request: [7] https://reviewboard.asterisk.org/r/1591/ Upstream patch (for 1.8 branch): [8] http://svnview.digium.com/svn/asterisk?view=revision&sortby=date&revision=345828 2) AST-2011-014 NULL pointer dereference (crash) when processing INFO automon message with no channel A NULL pointer dereference flaw was found in the way Asterisk handled INFO requests, when the 'automon' feature was enabled. If no channel had been created yet, a remote attacker could use this flaw to cause a denial of service (asterisk crash) by sending an INFO request. References: [9] http://www.asterisk.org/node/51693 [10] http://downloads.asterisk.org/pub/security/AST-2011-014.pdf [11] https://bugs.gentoo.org/show_bug.cgi?id=394095 [12] https://bugzilla.redhat.com/show_bug.cgi?id=765776 Upstream patch (for 1.8 branch): [13] http://svnview.digium.com/svn/asterisk?view=revision&sortby=date&revision=347533 Could you allocate CVE ids for these? Thank you && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.