asterisk stable update for CVE-2009-0041

Nico Golde nion at debian.org
Sun Apr 26 13:40:35 UTC 2009


Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for asterisk some time ago.

CVE-2009-0041[0]:
| IAX2 in Asterisk Open Source 1.2.x before 1.2.31, 1.4.x before
| 1.4.23-rc4, and 1.6.x before 1.6.0.3-rc2; Business Edition A.x.x,
| B.x.x before B.2.5.7, C.1.x.x before C.1.10.4, and C.2.x.x before
| C.2.1.2.1; and s800i 1.2.x before 1.3.0 responds differently to a
| failed login attempt depending on whether the user account exists,
| which allows remote attackers to enumerate valid usernames.

Unfortunately the vulnerability described above is not important enough
to get it fixed via regular security update in Debian stable. It does
not warrant a DSA.

This is Debian bug #513413.

However it would be nice if this could get fixed via a regular point update[1].
Please contact the release team for this.

This is an automatically generated mail, in case you are already working on an
upgrade this is of course pointless.

For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0041
[1] http://www.debian.org/doc/developers-reference/pkgs.html#upload-stable

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 197 bytes
Desc: not available
URL: <http://lists.alioth.debian.org/pipermail/pkg-voip-maintainers/attachments/20090426/41858a9a/attachment.pgp>


More information about the Pkg-voip-maintainers mailing list