Debian: DSA-1952-1: New asterisk packages fix several vulnerabilities

    Date15 Dec 2009
    CategoryDebian
    35
    Posted ByLinuxSecurity Advisories
    Several vulnerabilities have been discovered in asterisk, an Open Source PBX and telephony toolkit. The Common Vulnerabilities and Exposures project identifies the following problems:
    
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-1952-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                      Steffen Joeris
    December 15, 2009                     http://www.debian.org/security/faq
    - ------------------------------------------------------------------------
    
    Package        : asterisk               
    Vulnerability  : several vulnerabilities
    Problem type   : remote                 
    Debian-specific: no                     
    CVE ID         : CVE-2009-0041 CVE-2008-3903 CVE-2009-3727 CVE-2008-7220 CVE-2009-4055 CVE-2007-2383
    Debian Bug     : 513413 522528 554487 554486 559103                                                 
    
    
    Several vulnerabilities have been discovered in asterisk, an Open Source
    PBX and telephony toolkit. The Common Vulnerabilities and Exposures     
    project identifies the following problems:                              
    
    CVE-2009-0041
    
    It is possible to determine valid login names via probing, due to the
    IAX2 response from asterisk (AST-2009-001).
    
    CVE-2008-3903
    
    It is possible to determine a valid SIP username, when Digest
    authentication and authalwaysreject are enabled (AST-2009-003).
    
    CVE-2009-3727
    
    It is possible to determine a valid SIP username via multiple crafted
    REGISTER messages (AST-2009-008).
    
    CVE-2008-7220 CVE-2007-2383
    
    It was discovered that asterisk contains an obsolete copy of the
    Prototype JavaScript framework, which is vulnerable to several security
    issues. This copy is unused and now removed from asterisk
    (AST-2009-009).
    
    CVE-2009-4055
    
    It was discovered that it is possible to perform a denial of service
    attack via  RTP comfort noise payload with a long data length
    (AST-2009-010).
    
    
    For the stable distribution (lenny), these problems have been fixed in
    version 1:1.4.21.2~dfsg-3+lenny1.
    
    The security support for asterisk in the oldstable distribution (etch)
    has been discontinued before the end of the regular Etch security
    maintenance life cycle. You are strongly encouraged to upgrade to
    stable.
    
    For the testing distribution (squeeze) and the unstable distribution
    (sid), these problems have been fixed in version 1:1.6.2.0~rc7-1.
    
    
    We recommend that you upgrade your asterisk packages.
    
    Upgrade instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 5.0 alias lenny
    - --------------------------------
    
    Debian (stable)
    - ---------------
    
    Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
    
    Source archives:
    
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.4.21.2~dfsg.orig.tar.gz
        Size/MD5 checksum:  5295205 f641d1140b964e71e38d27bf3b2a2d80
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.4.21.2~dfsg-3+lenny1.dsc
        Size/MD5 checksum:     1984 69dcaf09361976f55a053512fb26d7b5
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.4.21.2~dfsg-3+lenny1.diff.gz
        Size/MD5 checksum:   150880 ba6e81cd6ab443ef04467d57a1d954b3
    
    Architecture independent packages:
    
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk-sounds-main_1.4.21.2~dfsg-3+lenny1_all.deb
        Size/MD5 checksum:  1897736 f0b7912d2ea0377bbb3c56cbc067d230
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk-config_1.4.21.2~dfsg-3+lenny1_all.deb
        Size/MD5 checksum:   478858 b483c77c21df4ae9cea8a4277f96966a
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk-doc_1.4.21.2~dfsg-3+lenny1_all.deb
        Size/MD5 checksum: 32514900 8d959ce35cc61436ee1e09af475459d1
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk-dev_1.4.21.2~dfsg-3+lenny1_all.deb
        Size/MD5 checksum:   427650 fb8a7dd925c8d209f3007e2a7d6602d8
    
    alpha architecture (DEC Alpha)
    
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk-dbg_1.4.21.2~dfsg-3+lenny1_alpha.deb
        Size/MD5 checksum: 13039044 3fdf468968472853a921817681130898
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.4.21.2~dfsg-3+lenny1_alpha.deb
        Size/MD5 checksum:   393068 f6360d4fee30fd4e915ce6f381dd5e81
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.4.21.2~dfsg-3+lenny1_alpha.deb
        Size/MD5 checksum:  2761948 017041bb2c755b0e404351134d40808a
    
    amd64 architecture (AMD x86_64 (AMD64))
    
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.4.21.2~dfsg-3+lenny1_amd64.deb
        Size/MD5 checksum:   397512 6f2936b9f76618b89c7994d094c372cf
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk-dbg_1.4.21.2~dfsg-3+lenny1_amd64.deb
        Size/MD5 checksum: 13086704 ed835ac48b8b0fd614ebc960007b508b
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.4.21.2~dfsg-3+lenny1_amd64.deb
        Size/MD5 checksum:  2605278 dc7e3fe7307e402d8d59504c89434a84
    
    arm architecture (ARM)
    
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk-dbg_1.4.21.2~dfsg-3+lenny1_arm.deb
        Size/MD5 checksum: 12770542 6b450a1fcae626174db68a0ec9c831be
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.4.21.2~dfsg-3+lenny1_arm.deb
        Size/MD5 checksum:   401766 fee883c4784ad9075da742d83f4baaa3
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.4.21.2~dfsg-3+lenny1_arm.deb
        Size/MD5 checksum:  2510430 cd143e5ccf034d4eba145b2deabe87bd
    
    armel architecture (ARM EABI)
    
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.4.21.2~dfsg-3+lenny1_armel.deb
        Size/MD5 checksum:   394588 d3e10caf1c6d790306701d9f34ac4fa4
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.4.21.2~dfsg-3+lenny1_armel.deb
        Size/MD5 checksum:  2540364 bb48863ea50a58f2358768c431fa1ca0
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk-dbg_1.4.21.2~dfsg-3+lenny1_armel.deb
        Size/MD5 checksum: 12840170 d02ebc2ddb92f53bcbd089bc4d41bd10
    
    hppa architecture (HP PA RISC)
    
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk-dbg_1.4.21.2~dfsg-3+lenny1_hppa.deb
        Size/MD5 checksum: 12871212 af107f8cc96f9b0b7030ec28a1967f13
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.4.21.2~dfsg-3+lenny1_hppa.deb
        Size/MD5 checksum:  2780732 8534dd0bd7e9a46264357beeb692df19
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.4.21.2~dfsg-3+lenny1_hppa.deb
        Size/MD5 checksum:   412474 ac2070408bb67f325bd6ad7d3cbf032d
    
    i386 architecture (Intel ia32)
    
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.4.21.2~dfsg-3+lenny1_i386.deb
        Size/MD5 checksum:  2407006 2bbd456e2d36a734ac0789b6ff7e9d22
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk-dbg_1.4.21.2~dfsg-3+lenny1_i386.deb
        Size/MD5 checksum: 12937820 46acd420961efc6c932d94eec0452ad3
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.4.21.2~dfsg-3+lenny1_i386.deb
        Size/MD5 checksum:   388450 7c9e49cb8610a577d63f3fb77ecd92da
    
    ia64 architecture (Intel ia64)
    
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk-dbg_1.4.21.2~dfsg-3+lenny1_ia64.deb
        Size/MD5 checksum: 13034554 8ca056f64fd91cc8597716834c894ce9
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.4.21.2~dfsg-3+lenny1_ia64.deb
        Size/MD5 checksum:   426588 9adc9d1948c77775cea4f248c7f261ae
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.4.21.2~dfsg-3+lenny1_ia64.deb
        Size/MD5 checksum:  3469020 6fcb11fa7b42f4cdce76c5c59a44b45c
    
    mips architecture (MIPS (Big Endian))
    
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.4.21.2~dfsg-3+lenny1_mips.deb
        Size/MD5 checksum:   381612 8373d46bc9e95e7f15821174f7432652
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk-dbg_1.4.21.2~dfsg-3+lenny1_mips.deb
        Size/MD5 checksum: 13433728 245c4ec2754177b5082d809733dc6e28
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.4.21.2~dfsg-3+lenny1_mips.deb
        Size/MD5 checksum:  2464570 6095542e8813aa8b64d025fe6c23697d
    
    powerpc architecture (PowerPC)
    
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.4.21.2~dfsg-3+lenny1_powerpc.deb
        Size/MD5 checksum:  2806054 30cba312761b5b442ec3fbecf457e2c2
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.4.21.2~dfsg-3+lenny1_powerpc.deb
        Size/MD5 checksum:   391488 ccb3c29a722a0a375aac06bd5937902c
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk-dbg_1.4.21.2~dfsg-3+lenny1_powerpc.deb
        Size/MD5 checksum: 13267248 e867f0f519ddf844b366739c62a88869
    
    sparc architecture (Sun SPARC/UltraSPARC)
    
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.4.21.2~dfsg-3+lenny1_sparc.deb
        Size/MD5 checksum:  2490436 434bf630723e57b97273291e780953c3
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk-dbg_1.4.21.2~dfsg-3+lenny1_sparc.deb
        Size/MD5 checksum: 12742386 004d7b7016529815d21e2a086c20c718
      http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.4.21.2~dfsg-3+lenny1_sparc.deb
        Size/MD5 checksum:   389034 601d2368a23b3ee43385b8c28928ba24
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and http://packages.debian.org/
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":55.56,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":11.11,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"15","type":"x","order":"3","pct":33.33,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.