*** This bug is a security vulnerability ***

Public security bug reported:

Binary package hint: asterisk

References:
DSA-1525-1 (http://www.debian.org/security/2008/dsa-1525)

(Note: CVE-2007-6430 has already been reported as Bug#199118, but is
still open for all stable releases.)

Quoting:
"Several remote vulnerabilities have been discovered in Asterisk, a free 
software PBX and telephony toolkit. The Common Vulnerabilities and Exposures 
project identifies the following problems:

    * CVE-2007-6430

      Tilghman Lesher discovered that database-based registrations are 
insufficiently validated. This only affects setups, which are configured to run 
without a password and only host-based authentication.
    * CVE-2008-1332

      Jason Parker discovered that insufficient validation of From: headers 
inside the SIP channel driver may lead to authentication bypass and the 
potential external initiation of calls.
    * CVE-2008-1333

      This update also fixes a format string vulnerability, which can
only be triggered through configuration files under control of the local
administrator. In later releases of Asterisk this issue is remotely
exploitable and tracked as CVE-2008-1333."

** Affects: asterisk (Ubuntu)
     Importance: Undecided
         Status: New

** Visibility changed to: Public

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-1332

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-1333

-- 
[asterisk] several vulnerabilities
https://bugs.launchpad.net/bugs/210124
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to