[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-1952 asterisk -- several vulnerabilities, end-of-life announcement in oldstable

ID: oval:org.mitre.oval:def:6950Date: (C)2010-05-24   (M)2024-02-19
Class: PATCHFamily: unix




Several vulnerabilities have been discovered in asterisk, an Open Source PBX and telephony toolkit. The Common Vulnerabilities and Exposures project identifies the following problems: It is possible to determine valid login names via probing, due to the IAX2 response from asterisk . It is possible to determine a valid SIP username, when Digest authentication and authalwaysreject are enabled . It is possible to determine a valid SIP username via multiple crafted REGISTER messages . It was discovered that asterisk contains an obsolete copy of the Prototype JavaScript framework, which is vulnerable to several security issues. This copy is unused and now removed from asterisk . It was discovered that it is possible to perform a denial of service attack via RTP comfort noise payload with a long data length . The current version in oldstable is not supported by upstream anymore and is affected by several security issues. Backporting fixes for these and any future issues has become unfeasible and therefore we need to drop our security support for the version in oldstable. We recommend that all asterisk users upgrade to the stable distribution .

Platform:
Debian 5.0
Product:
asterisk
Reference:
DSA-1952
CVE-2009-0041
CVE-2008-3903
CVE-2009-3727
CVE-2008-7220
CVE-2009-4055
CVE-2007-2383
CVE    6
CVE-2007-2383
CVE-2008-3903
CVE-2008-7220
CVE-2009-0041
...
CPE    1
cpe:/o:debian:debian_linux:5.0

© SecPod Technologies