Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <4EE1F864.7040609@redhat.com>
Date: Fri, 09 Dec 2011 13:00:36 +0100
From: Jan Lieskovsky <jlieskov@...hat.com>
To: "Steven M. Christey" <coley@...us.mitre.org>
CC: oss-security@...ts.openwall.com,
        Asterisk Development Team <asteriskteam@...ium.com>
Subject: CVE Request -- Asterisk -- AST-2011-013 and AST-2011-014

Hello Kurt, Steve, vendors,

   the following two security flaws have been recently fixed:
   http://www.asterisk.org/node/51693

in Asterisk:

1) AST-2011-013 Possible to enumerate SIP usernames when general and user/peer NAT settings differed

    An information disclosure flaw was found in the way Asterisk handled UDP
    requests in configurations using network address translation (NAT) for the SIP
    protocol. When the general configuration file section and user / peer
    configuration file section NAT settings differed, it was possible to enumerate
    SIP usernames if the request was sent to different port as that, specified in
    the Via header.

    References:
    [1] http://www.asterisk.org/node/51693
    [2] http://downloads.asterisk.org/pub/security/AST-2011-013.pdf
    [3] http://lists.digium.com/pipermail/asterisk-dev/2011-November/thread.html#52191
    [4] https://bugs.gentoo.org/show_bug.cgi?id=394095
    [5] https://bugzilla.redhat.com/show_bug.cgi?id=765773

    Upstream bug report:
    [6] https://issues.asterisk.org/jira/browse/ASTERISK-18862

    Upstream review board request:
    [7] https://reviewboard.asterisk.org/r/1591/

    Upstream patch (for 1.8 branch):
    [8] http://svnview.digium.com/svn/asterisk?view=revision&sortby=date&revision=345828

2) AST-2011-014 NULL pointer dereference (crash) when processing INFO automon message
    with no channel

    A NULL pointer dereference flaw was found in the way Asterisk handled INFO
    requests, when the 'automon' feature was enabled. If no channel had been
    created yet, a remote attacker could use this flaw to cause a denial of service
    (asterisk crash) by sending an INFO request.

    References:
    [9]  http://www.asterisk.org/node/51693
    [10] http://downloads.asterisk.org/pub/security/AST-2011-014.pdf
    [11] https://bugs.gentoo.org/show_bug.cgi?id=394095
    [12] https://bugzilla.redhat.com/show_bug.cgi?id=765776

    Upstream patch (for 1.8 branch):
    [13] http://svnview.digium.com/svn/asterisk?view=revision&sortby=date&revision=347533

Could you allocate CVE ids for these?

Thank you && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.