Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.60616
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-1525-1)
Summary:The remote host is missing an update for the Debian 'asterisk' package(s) announced via the DSA-1525-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'asterisk' package(s) announced via the DSA-1525-1 advisory.

Vulnerability Insight:
Several remote vulnerabilities have been discovered in Asterisk, a free software PBX and telephony toolkit. The Common Vulnerabilities and Exposures project identifies the following problems:

CVE-2007-6430

Tilghman Lesher discovered that database-based registrations are insufficiently validated. This only affects setups, which are configured to run without a password and only host-based authentication.

CVE-2008-1332

Jason Parker discovered that insufficient validation of From: headers inside the SIP channel driver may lead to authentication bypass and the potential external initiation of calls.

CVE-2008-1333

This update also fixes a format string vulnerability, which can only be triggered through configuration files under control of the local administrator. In later releases of Asterisk this issue is remotely exploitable and tracked as CVE-2008-1333.

The status of the old stable distribution (sarge) is currently being investigated. If affected, an update will be released through security.debian.org.

For the stable distribution (etch), these problems have been fixed in version 1:1.2.13~
dfsg-2etch3.

We recommend that you upgrade your asterisk packages.

Affected Software/OS:
'asterisk' package(s) on Debian 4.

Solution:
Please install the updated package(s).

CVSS Score:
8.8

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-6430
BugTraq ID: 26928
http://www.securityfocus.com/bid/26928
Bugtraq: 20071218 AST-2007-027 - Database matching order permits host-based authentication to be ignored (Google Search)
http://www.securityfocus.com/archive/1/485287/100/0/threaded
Debian Security Information: DSA-1525 (Google Search)
http://www.debian.org/security/2008/dsa-1525
http://security.gentoo.org/glsa/glsa-200804-13.xml
http://www.osvdb.org/39519
http://www.securitytracker.com/id?1019110
http://secunia.com/advisories/28149
http://secunia.com/advisories/29242
http://secunia.com/advisories/29456
http://secunia.com/advisories/29782
http://securityreason.com/securityalert/3467
SuSE Security Announcement: SUSE-SR:2008:005 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html
http://www.vupen.com/english/advisories/2007/4260
XForce ISS Database: asterisk-registration-security-bypass(39124)
https://exchange.xforce.ibmcloud.com/vulnerabilities/39124
Common Vulnerability Exposure (CVE) ID: CVE-2008-1332
BugTraq ID: 28310
http://www.securityfocus.com/bid/28310
Bugtraq: 20080318 AST-2008-003: Unauthenticated calls allowed from SIP channel driver (Google Search)
http://www.securityfocus.com/archive/1/489818/100/0/threaded
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html
http://securitytracker.com/id?1019629
http://secunia.com/advisories/29426
http://secunia.com/advisories/29470
http://secunia.com/advisories/29957
SuSE Security Announcement: SUSE-SR:2008:010 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html
http://www.vupen.com/english/advisories/2008/0928
XForce ISS Database: asterisk-sip-security-bypass(41308)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41308
Common Vulnerability Exposure (CVE) ID: CVE-2008-1333
BugTraq ID: 28311
http://www.securityfocus.com/bid/28311
Bugtraq: 20080318 AST-2008-004: Format String Vulnerability in Logger and Manager (Google Search)
http://www.securityfocus.com/archive/1/489823/100/0/threaded
http://securitytracker.com/id?1019630
XForce ISS Database: asterisk-astverbose-dos(41301)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41301
CopyrightCopyright (C) 2008 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.