Debian DSA-1952-1 : asterisk - several vulnerabilities, end-of-life announcement in oldstable

High Nessus Plugin ID 44817

Synopsis

The remote Debian host is missing a security-related update.

Description

Several vulnerabilities have been discovered in asterisk, an Open Source PBX and telephony toolkit. The Common Vulnerabilities and Exposures project identifies the following problems :

- CVE-2009-0041 It is possible to determine valid login names via probing, due to the IAX2 response from asterisk (AST-2009-001).

- CVE-2008-3903 It is possible to determine a valid SIP username, when Digest authentication and authalwaysreject are enabled (AST-2009-003).

- CVE-2009-3727 It is possible to determine a valid SIP username via multiple crafted REGISTER messages (AST-2009-008).

- CVE-2008-7220 CVE-2007-2383 It was discovered that asterisk contains an obsolete copy of the Prototype JavaScript framework, which is vulnerable to several security issues. This copy is unused and now removed from asterisk (AST-2009-009).

- CVE-2009-4055 It was discovered that it is possible to perform a denial of service attack via RTP comfort noise payload with a long data length (AST-2009-010).

The current version in oldstable is not supported by upstream anymore and is affected by several security issues. Backporting fixes for these and any future issues has become unfeasible and therefore we need to drop our security support for the version in oldstable. We recommend that all asterisk users upgrade to the stable distribution (lenny).

Solution

Upgrade the asterisk packages.

For the stable distribution (lenny), these problems have been fixed in version 1:1.4.21.2~dfsg-3+lenny1.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=513413

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=522528

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=554487

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=554486

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559103

https://security-tracker.debian.org/tracker/CVE-2009-0041

https://security-tracker.debian.org/tracker/CVE-2008-3903

https://security-tracker.debian.org/tracker/CVE-2009-3727

https://security-tracker.debian.org/tracker/CVE-2008-7220

https://security-tracker.debian.org/tracker/CVE-2007-2383

https://security-tracker.debian.org/tracker/CVE-2009-4055

https://www.debian.org/security/2009/dsa-1952

Plugin Details

Severity: High

ID: 44817

File Name: debian_DSA-1952.nasl

Version: 1.16

Type: local

Agent: unix

Published: 2010/02/24

Updated: 2018/11/10

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:asterisk, cpe:/o:debian:debian_linux:5.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2009/12/15

Reference Information

CVE: CVE-2007-2383, CVE-2008-3903, CVE-2008-7220, CVE-2009-0041, CVE-2009-3727, CVE-2009-4055

BID: 36926, 37153

DSA: 1952

CWE: 200