Debian DSA-1952-1 : asterisk - several vulnerabilities, end-of-life announcement in oldstable

high Nessus Plugin ID 44817

Language:

Synopsis

The remote Debian host is missing a security-related update.

Description

Several vulnerabilities have been discovered in asterisk, an Open Source PBX and telephony toolkit. The Common Vulnerabilities and Exposures project identifies the following problems :

- CVE-2009-0041 It is possible to determine valid login names via probing, due to the IAX2 response from asterisk (AST-2009-001).

- CVE-2008-3903 It is possible to determine a valid SIP username, when Digest authentication and authalwaysreject are enabled (AST-2009-003).

- CVE-2009-3727 It is possible to determine a valid SIP username via multiple crafted REGISTER messages (AST-2009-008).

- CVE-2008-7220 CVE-2007-2383 It was discovered that asterisk contains an obsolete copy of the Prototype JavaScript framework, which is vulnerable to several security issues. This copy is unused and now removed from asterisk (AST-2009-009).

- CVE-2009-4055 It was discovered that it is possible to perform a denial of service attack via RTP comfort noise payload with a long data length (AST-2009-010).

The current version in oldstable is not supported by upstream anymore and is affected by several security issues. Backporting fixes for these and any future issues has become unfeasible and therefore we need to drop our security support for the version in oldstable. We recommend that all asterisk users upgrade to the stable distribution (lenny).

Solution

Upgrade the asterisk packages.

For the stable distribution (lenny), these problems have been fixed in version 1:1.4.21.2~dfsg-3+lenny1.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=513413

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=522528

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=554487

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=554486

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559103

https://security-tracker.debian.org/tracker/CVE-2009-0041

https://security-tracker.debian.org/tracker/CVE-2008-3903

https://security-tracker.debian.org/tracker/CVE-2009-3727

https://security-tracker.debian.org/tracker/CVE-2008-7220

https://security-tracker.debian.org/tracker/CVE-2007-2383

https://security-tracker.debian.org/tracker/CVE-2009-4055

https://www.debian.org/security/2009/dsa-1952

Plugin Details

Severity: High

ID: 44817

File Name: debian_DSA-1952.nasl

Version: 1.18

Type: local

Agent: unix

Published: 2/24/2010

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:asterisk, cpe:/o:debian:debian_linux:5.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 12/15/2009

Reference Information

CVE: CVE-2007-2383, CVE-2008-3903, CVE-2008-7220, CVE-2009-0041, CVE-2009-3727, CVE-2009-4055

BID: 36926, 37153

CWE: 200

DSA: 1952