asterisk oldstable update for CVE-2008-3903, CVE-2009-0041
giuseppe at iuculano.it
Wed Jun 3 17:41:23 UTC 2009
the following CVE (Common Vulnerabilities & Exposures) ids were
published for asterisk some time ago.
| Asterisk Open Source 1.2.x before 1.2.32, 1.4.x before 22.214.171.124, and
| 1.6.0.x before 126.96.36.199; Asterisk Business Edition A.x.x, B.x.x before
| B.2.5.8, C.1.x.x before C.1.10.5, and C.2.x.x before C.2.3.3; s800i
| 1.3.x before 188.8.131.52; and Trixbox PBX 2.6.1, when Digest
| authentication and authalwaysreject are enabled, generates different
| responses depending on whether a SIP username is valid, which allows
| remote attackers to enumerate valid usernames.
| IAX2 in Asterisk Open Source 1.2.x before 1.2.31, 1.4.x before
| 1.4.23-rc4, and 1.6.x before 184.108.40.206-rc2; Business Edition A.x.x,
| B.x.x before B.2.5.7, C.1.x.x before C.1.10.4, and C.2.x.x before
| C.220.127.116.11; and s800i 1.2.x before 1.3.0 responds differently to a
| failed login attempt depending on whether the user account exists,
| which allows remote attackers to enumerate valid usernames.
Unfortunately the vulnerability described above is not important enough
to get it fixed via regular security update in Debian oldstable. It does
not warrant a DSA.
However it would be nice if this could get fixed via a regular point update.
Please contact the release team for this.
This is an automatically generated mail, in case you are already working on an
upgrade this is of course pointless.
For further information see:
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 197 bytes
Desc: OpenPGP digital signature
More information about the Pkg-voip-maintainers