[asterisk] several vulnerabilities

Bug #210124 reported by disabled.user
258
Affects Status Importance Assigned to Milestone
asterisk (Ubuntu)
Fix Released
Undecided
William Grant
Dapper
Won't Fix
Undecided
Unassigned
Edgy
Won't Fix
Undecided
Unassigned
Feisty
Won't Fix
Undecided
Unassigned
Gutsy
Won't Fix
Undecided
Unassigned
Hardy
Fix Released
Undecided
William Grant

Bug Description

Binary package hint: asterisk

References:
DSA-1525-1 (http://www.debian.org/security/2008/dsa-1525)

(Note: CVE-2007-6430 has already been reported as Bug#199118, but is still open for all stable releases.)

Quoting:
"Several remote vulnerabilities have been discovered in Asterisk, a free software PBX and telephony toolkit. The Common Vulnerabilities and Exposures project identifies the following problems:

    * CVE-2007-6430

      Tilghman Lesher discovered that database-based registrations are insufficiently validated. This only affects setups, which are configured to run without a password and only host-based authentication.
    * CVE-2008-1332

      Jason Parker discovered that insufficient validation of From: headers inside the SIP channel driver may lead to authentication bypass and the potential external initiation of calls.
    * CVE-2008-1333

      This update also fixes a format string vulnerability, which can only be triggered through configuration files under control of the local administrator. In later releases of Asterisk this issue is remotely exploitable and tracked as CVE-2008-1333."

CVE References

Revision history for this message
William Grant (wgrant) wrote :

CVE-2008-1390 and CVE-2008-1289 also apply. I'm fixing these in Hardy now. Please don't report the same CVE twice, as it stuffs up tracking if it's already fixed in Hardy, when the rest of the CVEs aren't.

Changed in asterisk:
assignee: nobody → fujitsu
status: New → In Progress
Revision history for this message
William Grant (wgrant) wrote :

Also, please subscribe motu-swat to universe and multiverse security bugs in future, or we're not notified.

Revision history for this message
William Grant (wgrant) wrote :

I've extracted patches for all but -1390 from 1.14.18.1.

Revision history for this message
William Grant (wgrant) wrote :
Revision history for this message
William Grant (wgrant) wrote :
Revision history for this message
William Grant (wgrant) wrote :

-1390 is much less important, and a patch isn't readily available, so it can be tracked in a different bug.

Revision history for this message
disabled.user (disabled.user-deactivatedaccount) wrote :

Originally this bug report was intended mainly for CVE-2008-1332 and CVE-2008-1333, which I both added as CVE references. I only mentioned CVE-2007-6430 because it's in DSA-1525-1, but wrote that it's been handled in Bug#199118 and therefore didn't add a CVE reference to this bug report.

Also, I thought that Launchpad by itself adds MOTU to subscribers for packages from universe and multiverse? As far as I remeber it did so in the not so distant past (very sane feature).

Revision history for this message
William Grant (wgrant) wrote :

Shh, don't mention ***-****-6430 again, as Launchpad seems to be very sensitive and decides to readd it every time it's mentioned, even if it has already been manually removed.

With regard to the implicit subscriptions: that has never been the case. The bugmail would be absolutely insane.

However, we're hoping that motu-swat will be automatically subscribed to universe/multiverse security bugs in the not too distant future. Until then, please manually subscribe us.

Revision history for this message
disabled.user (disabled.user-deactivatedaccount) wrote :

Ah yes, now that you've mentioned it, I've also sometimes stumbled on Launpad's automacially adding of CVEs in comments. Nice meant, but seemingly sometimes very insane feature ;-)

Okay, will keep in mind to manually add MOTU SWAT to related bug reports, though I'd bet something on it that I've seen MOTU having been added to "Also notified:" in the past. Weird.

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package asterisk - 1:1.4.17~dfsg-2ubuntu1

---------------
asterisk (1:1.4.17~dfsg-2ubuntu1) hardy; urgency=low

  * SECURITY UPDATE: arbitrary code execution and authentication bypass.
    (LP: #210124)
    - debian/patches/CVE-2008-1289: Check that incoming RTP payloads are
      within buffer limits. Patch from Debian.
    - debian/patches/CVE-2008-1332: Ensure that allowguest has been enabled
      before deciding that authentication isn't required. Patch from Debian.
    - debian/patches/CVE-2008-1333: Interpret logging output as a character
      string, not a format string. Patch from Debian.
    - References:
      + CVE-2008-1289
      + CVE-2008-1332
      + CVE-2008-1333
      + AST-2008-002
      + AST-2008-003
      + AST-2008-004
  * Modify Maintainer value to match the DebianMaintainerField
    specification.

 -- William Grant <email address hidden> Sat, 05 Apr 2008 11:32:12 +1100

Changed in asterisk:
status: In Progress → Fix Released
Revision history for this message
Hew (hew) wrote :

Ubuntu Edgy Eft is no longer supported, so a SRU will not be issued for this release. Marking Edgy as Won't Fix.

Changed in asterisk:
status: New → Won't Fix
Revision history for this message
Hew (hew) wrote :

Ubuntu Feisty Fawn is no longer supported, so a SRU will not be issued for this release. Marking Feisty as Won't Fix.

Changed in asterisk:
status: New → Won't Fix
Revision history for this message
Sergio Zanchetta (primes2h) wrote :

The 18 month support period for Gutsy Gibbon 7.10 has reached its end of life -
http://www.ubuntu.com/news/ubuntu-7.10-eol . As a result, we are closing the
Gutsy task.

Changed in asterisk (Ubuntu Gutsy):
status: New → Won't Fix
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Thank you for reporting this bug to Ubuntu. dapper has reached EOL
(End of Life) and is no longer supported. As a result, this bug
against dapper is being marked "Won't Fix". Please see
https://wiki.ubuntu.com/Releases for currently supported Ubuntu
releases.

Please feel free to report any other bugs you may find.

Changed in asterisk (Ubuntu Dapper):
status: New → Won't Fix
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.