SIP responses expose valid usernames
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
asterisk (Ubuntu) |
Fix Released
|
Undecided
|
Dave Walker | ||
Dapper |
Won't Fix
|
Undecided
|
Unassigned | ||
Hardy |
Won't Fix
|
Undecided
|
Unassigned | ||
Intrepid |
Invalid
|
Undecided
|
Unassigned | ||
Jaunty |
Won't Fix
|
Undecided
|
Unassigned | ||
Karmic |
Fix Released
|
Undecided
|
Dave Walker |
Bug Description
Binary package hint: asterisk
It is possible to determine if a peer with a specific name is configured in Asterisk by sending a specially crafted REGISTER message twice. The username that is to be checked is put in the user portion of the URI in the To header. A bogus non-matching value is put into the username portion of the Digest in the Authorization header. If the peer does exist the second REGISTER will receive a response of “403 Authentication user name does not match account name”. If the peer does not exist the response will be “404 Not Found” if alwaysauthreject is disabled and “401 Unauthorized” if alwaysauthreject is enabled.
http://
Changed in asterisk (Ubuntu): | |
assignee: | nobody → Dave Walker (davewalker) |
visibility: | private → public |
Changed in asterisk (Ubuntu Dapper): | |
status: | New → Confirmed |
Changed in asterisk (Ubuntu Hardy): | |
status: | New → Confirmed |
Changed in asterisk (Ubuntu Intrepid): | |
status: | New → Confirmed |
Changed in asterisk (Ubuntu Jaunty): | |
status: | New → Confirmed |
Changed in asterisk (Ubuntu Karmic): | |
status: | New → Confirmed |
Changed in asterisk (Ubuntu): | |
status: | New → Confirmed |
Changed in asterisk (Ubuntu Karmic): | |
assignee: | nobody → Dave Walker (davewalker) |
status: | Confirmed → In Progress |
Changed in asterisk (Ubuntu Dapper): | |
status: | Confirmed → Fix Committed |
status: | Fix Committed → Confirmed |
This bug was fixed in the package asterisk - 1:1.6.2. 0~rc2-0ubuntu1. 1
--------------- 2.0~rc2- 0ubuntu1. 1) karmic-security; urgency=low
asterisk (1:1.6.
* SECURITY UPDATE: ACL not respected on SIP INVITE (LP: #491632). patches/ AST-2009- 007: Additional check in channels/chan_sip.c to patches/ AST-2009- 008: Sanitise certain return of REGISTER message patches/ AST-2009- 010: Stops Asterisk from crashing when an RTP
- debian/
check ACL for handling SIP INVITEs. This blocks calls on networks
intended to be prohibited, by configuration. Based on upstream patch.
- AST-2009-007
- CVE-2009-3723
* SECURITY UPDATE: SIP responses expose valid usernames (LP: #491637).
- debian/
to stop a specially crafted series of requests returning valid usernames.
Based on upstream patch.
- AST-2009-008
- CVE-2009-3727
* SECURITY UPDATE: RTP Remote Crash Vulnerability (LP: #493555).
- debian/
comfort noise payload containing 24 bytes or greater is recieved.
- AST-2009-010
- CVE-2009-4055
-- Dave Walker (Daviey) <email address hidden> Mon, 07 Dec 2009 12:23:36 +0000