Linux Security
    Linux Security
    Linux Security

    Debian: DSA-1952-1: New asterisk packages fix several vulnerabilities

    Date 15 Dec 2009
    Posted By LinuxSecurity Advisories
    Several vulnerabilities have been discovered in asterisk, an Open Source PBX and telephony toolkit. The Common Vulnerabilities and Exposures project identifies the following problems:
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-1952-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.                      Steffen Joeris
    December 15, 2009           
    - ------------------------------------------------------------------------
    Package        : asterisk               
    Vulnerability  : several vulnerabilities
    Problem type   : remote                 
    Debian-specific: no                     
    CVE ID         : CVE-2009-0041 CVE-2008-3903 CVE-2009-3727 CVE-2008-7220 CVE-2009-4055 CVE-2007-2383
    Debian Bug     : 513413 522528 554487 554486 559103                                                 
    Several vulnerabilities have been discovered in asterisk, an Open Source
    PBX and telephony toolkit. The Common Vulnerabilities and Exposures     
    project identifies the following problems:                              
    It is possible to determine valid login names via probing, due to the
    IAX2 response from asterisk (AST-2009-001).
    It is possible to determine a valid SIP username, when Digest
    authentication and authalwaysreject are enabled (AST-2009-003).
    It is possible to determine a valid SIP username via multiple crafted
    REGISTER messages (AST-2009-008).
    CVE-2008-7220 CVE-2007-2383
    It was discovered that asterisk contains an obsolete copy of the
    Prototype JavaScript framework, which is vulnerable to several security
    issues. This copy is unused and now removed from asterisk
    It was discovered that it is possible to perform a denial of service
    attack via  RTP comfort noise payload with a long data length
    For the stable distribution (lenny), these problems have been fixed in
    version 1:
    The security support for asterisk in the oldstable distribution (etch)
    has been discontinued before the end of the regular Etch security
    maintenance life cycle. You are strongly encouraged to upgrade to
    For the testing distribution (squeeze) and the unstable distribution
    (sid), these problems have been fixed in version 1:
    We recommend that you upgrade your asterisk packages.
    Upgrade instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 5.0 alias lenny
    - --------------------------------
    Debian (stable)
    - ---------------
    Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
    Source archives:
        Size/MD5 checksum:  5295205 f641d1140b964e71e38d27bf3b2a2d80
        Size/MD5 checksum:     1984 69dcaf09361976f55a053512fb26d7b5
        Size/MD5 checksum:   150880 ba6e81cd6ab443ef04467d57a1d954b3
    Architecture independent packages:
        Size/MD5 checksum:  1897736 f0b7912d2ea0377bbb3c56cbc067d230
        Size/MD5 checksum:   478858 b483c77c21df4ae9cea8a4277f96966a
        Size/MD5 checksum: 32514900 8d959ce35cc61436ee1e09af475459d1
        Size/MD5 checksum:   427650 fb8a7dd925c8d209f3007e2a7d6602d8
    alpha architecture (DEC Alpha)
        Size/MD5 checksum: 13039044 3fdf468968472853a921817681130898
        Size/MD5 checksum:   393068 f6360d4fee30fd4e915ce6f381dd5e81
        Size/MD5 checksum:  2761948 017041bb2c755b0e404351134d40808a
    amd64 architecture (AMD x86_64 (AMD64))
        Size/MD5 checksum:   397512 6f2936b9f76618b89c7994d094c372cf
        Size/MD5 checksum: 13086704 ed835ac48b8b0fd614ebc960007b508b
        Size/MD5 checksum:  2605278 dc7e3fe7307e402d8d59504c89434a84
    arm architecture (ARM)
        Size/MD5 checksum: 12770542 6b450a1fcae626174db68a0ec9c831be
        Size/MD5 checksum:   401766 fee883c4784ad9075da742d83f4baaa3
        Size/MD5 checksum:  2510430 cd143e5ccf034d4eba145b2deabe87bd
    armel architecture (ARM EABI)
        Size/MD5 checksum:   394588 d3e10caf1c6d790306701d9f34ac4fa4
        Size/MD5 checksum:  2540364 bb48863ea50a58f2358768c431fa1ca0
        Size/MD5 checksum: 12840170 d02ebc2ddb92f53bcbd089bc4d41bd10
    hppa architecture (HP PA RISC)
        Size/MD5 checksum: 12871212 af107f8cc96f9b0b7030ec28a1967f13
        Size/MD5 checksum:  2780732 8534dd0bd7e9a46264357beeb692df19
        Size/MD5 checksum:   412474 ac2070408bb67f325bd6ad7d3cbf032d
    i386 architecture (Intel ia32)
        Size/MD5 checksum:  2407006 2bbd456e2d36a734ac0789b6ff7e9d22
        Size/MD5 checksum: 12937820 46acd420961efc6c932d94eec0452ad3
        Size/MD5 checksum:   388450 7c9e49cb8610a577d63f3fb77ecd92da
    ia64 architecture (Intel ia64)
        Size/MD5 checksum: 13034554 8ca056f64fd91cc8597716834c894ce9
        Size/MD5 checksum:   426588 9adc9d1948c77775cea4f248c7f261ae
        Size/MD5 checksum:  3469020 6fcb11fa7b42f4cdce76c5c59a44b45c
    mips architecture (MIPS (Big Endian))
        Size/MD5 checksum:   381612 8373d46bc9e95e7f15821174f7432652
        Size/MD5 checksum: 13433728 245c4ec2754177b5082d809733dc6e28
        Size/MD5 checksum:  2464570 6095542e8813aa8b64d025fe6c23697d
    powerpc architecture (PowerPC)
        Size/MD5 checksum:  2806054 30cba312761b5b442ec3fbecf457e2c2
        Size/MD5 checksum:   391488 ccb3c29a722a0a375aac06bd5937902c
        Size/MD5 checksum: 13267248 e867f0f519ddf844b366739c62a88869
    sparc architecture (Sun SPARC/UltraSPARC)
        Size/MD5 checksum:  2490436 434bf630723e57b97273291e780953c3
        Size/MD5 checksum: 12742386 004d7b7016529815d21e2a086c20c718
        Size/MD5 checksum:   389034 601d2368a23b3ee43385b8c28928ba24
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and

    LinuxSecurity Poll

    Which is the best secure Linux distro for pentesting?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"174","title":"Kali Linux","votes":"15","type":"x","order":"1","pct":57.69,"resources":[]},{"id":"175","title":"Parrot OS","votes":"10","type":"x","order":"2","pct":38.46,"resources":[]},{"id":"176","title":"BlackArch Linux","votes":"1","type":"x","order":"3","pct":3.85,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.