Lucene search

K
gentooGentoo FoundationGLSA-200804-13
HistoryApr 14, 2008 - 12:00 a.m.

Asterisk: Multiple vulnerabilities

2008-04-1400:00:00
Gentoo Foundation
security.gentoo.org
19

CVSS2

8.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:C/I:C/A:N

EPSS

0.031

Percentile

91.2%

Background

Asterisk is an open source telephony engine and tool kit.

Description

Asterisk upstream developers reported multiple vulnerabilities:

  • The Call Detail Record Postgres logging engine (cdr_pgsql) does not correctly escape the ANI and DNIS arguments before using them in SQL statements (CVE-2007-6170).
  • When using database-based registrations (โ€œrealtimeโ€) and host-based authentication, Asterisk does not check the IP address when the username is correct and there is no password provided (CVE-2007-6430).
  • The SIP channel driver does not correctly determine if authentication is required (CVE-2008-1332).

Impact

Remote authenticated attackers could send specially crafted data to Asterisk to execute arbitrary SQL commands and compromise the administrative database. Remote unauthenticated attackers could bypass authentication using a valid username to hijack other userโ€™s sessions, and establish sessions on the SIP channel without authentication.

Workaround

There is no known workaround at this time.

Resolution

All Asterisk users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-misc/asterisk-1.2.27"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-misc/asterisk<ย 1.2.27UNKNOWN

CVSS2

8.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:C/I:C/A:N

EPSS

0.031

Percentile

91.2%