-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ Debian Security Advisory DSA-1952-1 security@debian.org http://www.debian.org/security/ Steffen Joeris December 15, 2009 http://www.debian.org/security/faq - ------------------------------------------------------------------------ Package : asterisk Vulnerability : several vulnerabilities Problem type : remote Debian-specific: no CVE ID : CVE-2009-0041 CVE-2008-3903 CVE-2009-3727 CVE-2008-7220 CVE-2009-4055 CVE-2007-2383 Debian Bug : 513413 522528 554487 554486 559103 Several vulnerabilities have been discovered in asterisk, an Open Source PBX and telephony toolkit. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-0041 It is possible to determine valid login names via probing, due to the IAX2 response from asterisk (AST-2009-001). CVE-2008-3903 It is possible to determine a valid SIP username, when Digest authentication and authalwaysreject are enabled (AST-2009-003). CVE-2009-3727 It is possible to determine a valid SIP username via multiple crafted REGISTER messages (AST-2009-008). CVE-2008-7220 CVE-2007-2383 It was discovered that asterisk contains an obsolete copy of the Prototype JavaScript framework, which is vulnerable to several security issues. This copy is unused and now removed from asterisk (AST-2009-009). CVE-2009-4055 It was discovered that it is possible to perform a denial of service attack via RTP comfort noise payload with a long data length (AST-2009-010). For the stable distribution (lenny), these problems have been fixed in version 1:1.4.21.2~dfsg-3+lenny1. The security support for asterisk in the oldstable distribution (etch) has been discontinued before the end of the regular Etch security maintenance life cycle. You are strongly encouraged to upgrade to stable. For the testing distribution (squeeze) and the unstable distribution (sid), these problems have been fixed in version 1:1.6.2.0~rc7-1. We recommend that you upgrade your asterisk packages. Upgrade instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 5.0 alias lenny - -------------------------------- Debian (stable) - --------------- Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.4.21.2~dfsg.orig.tar.gz Size/MD5 checksum: 5295205 f641d1140b964e71e38d27bf3b2a2d80 http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.4.21.2~dfsg-3+lenny1.dsc Size/MD5 checksum: 1984 69dcaf09361976f55a053512fb26d7b5 http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.4.21.2~dfsg-3+lenny1.diff.gz Size/MD5 checksum: 150880 ba6e81cd6ab443ef04467d57a1d954b3 Architecture independent packages: http://security.debian.org/pool/updates/main/a/asterisk/asterisk-sounds-main_1.4.21.2~dfsg-3+lenny1_all.deb Size/MD5 checksum: 1897736 f0b7912d2ea0377bbb3c56cbc067d230 http://security.debian.org/pool/updates/main/a/asterisk/asterisk-config_1.4.21.2~dfsg-3+lenny1_all.deb Size/MD5 checksum: 478858 b483c77c21df4ae9cea8a4277f96966a http://security.debian.org/pool/updates/main/a/asterisk/asterisk-doc_1.4.21.2~dfsg-3+lenny1_all.deb Size/MD5 checksum: 32514900 8d959ce35cc61436ee1e09af475459d1 http://security.debian.org/pool/updates/main/a/asterisk/asterisk-dev_1.4.21.2~dfsg-3+lenny1_all.deb Size/MD5 checksum: 427650 fb8a7dd925c8d209f3007e2a7d6602d8 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/a/asterisk/asterisk-dbg_1.4.21.2~dfsg-3+lenny1_alpha.deb Size/MD5 checksum: 13039044 3fdf468968472853a921817681130898 http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.4.21.2~dfsg-3+lenny1_alpha.deb Size/MD5 checksum: 393068 f6360d4fee30fd4e915ce6f381dd5e81 http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.4.21.2~dfsg-3+lenny1_alpha.deb Size/MD5 checksum: 2761948 017041bb2c755b0e404351134d40808a amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.4.21.2~dfsg-3+lenny1_amd64.deb Size/MD5 checksum: 397512 6f2936b9f76618b89c7994d094c372cf http://security.debian.org/pool/updates/main/a/asterisk/asterisk-dbg_1.4.21.2~dfsg-3+lenny1_amd64.deb Size/MD5 checksum: 13086704 ed835ac48b8b0fd614ebc960007b508b http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.4.21.2~dfsg-3+lenny1_amd64.deb Size/MD5 checksum: 2605278 dc7e3fe7307e402d8d59504c89434a84 arm architecture (ARM) http://security.debian.org/pool/updates/main/a/asterisk/asterisk-dbg_1.4.21.2~dfsg-3+lenny1_arm.deb Size/MD5 checksum: 12770542 6b450a1fcae626174db68a0ec9c831be http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.4.21.2~dfsg-3+lenny1_arm.deb Size/MD5 checksum: 401766 fee883c4784ad9075da742d83f4baaa3 http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.4.21.2~dfsg-3+lenny1_arm.deb Size/MD5 checksum: 2510430 cd143e5ccf034d4eba145b2deabe87bd armel architecture (ARM EABI) http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.4.21.2~dfsg-3+lenny1_armel.deb Size/MD5 checksum: 394588 d3e10caf1c6d790306701d9f34ac4fa4 http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.4.21.2~dfsg-3+lenny1_armel.deb Size/MD5 checksum: 2540364 bb48863ea50a58f2358768c431fa1ca0 http://security.debian.org/pool/updates/main/a/asterisk/asterisk-dbg_1.4.21.2~dfsg-3+lenny1_armel.deb Size/MD5 checksum: 12840170 d02ebc2ddb92f53bcbd089bc4d41bd10 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/a/asterisk/asterisk-dbg_1.4.21.2~dfsg-3+lenny1_hppa.deb Size/MD5 checksum: 12871212 af107f8cc96f9b0b7030ec28a1967f13 http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.4.21.2~dfsg-3+lenny1_hppa.deb Size/MD5 checksum: 2780732 8534dd0bd7e9a46264357beeb692df19 http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.4.21.2~dfsg-3+lenny1_hppa.deb Size/MD5 checksum: 412474 ac2070408bb67f325bd6ad7d3cbf032d i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.4.21.2~dfsg-3+lenny1_i386.deb Size/MD5 checksum: 2407006 2bbd456e2d36a734ac0789b6ff7e9d22 http://security.debian.org/pool/updates/main/a/asterisk/asterisk-dbg_1.4.21.2~dfsg-3+lenny1_i386.deb Size/MD5 checksum: 12937820 46acd420961efc6c932d94eec0452ad3 http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.4.21.2~dfsg-3+lenny1_i386.deb Size/MD5 checksum: 388450 7c9e49cb8610a577d63f3fb77ecd92da ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/a/asterisk/asterisk-dbg_1.4.21.2~dfsg-3+lenny1_ia64.deb Size/MD5 checksum: 13034554 8ca056f64fd91cc8597716834c894ce9 http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.4.21.2~dfsg-3+lenny1_ia64.deb Size/MD5 checksum: 426588 9adc9d1948c77775cea4f248c7f261ae http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.4.21.2~dfsg-3+lenny1_ia64.deb Size/MD5 checksum: 3469020 6fcb11fa7b42f4cdce76c5c59a44b45c mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.4.21.2~dfsg-3+lenny1_mips.deb Size/MD5 checksum: 381612 8373d46bc9e95e7f15821174f7432652 http://security.debian.org/pool/updates/main/a/asterisk/asterisk-dbg_1.4.21.2~dfsg-3+lenny1_mips.deb Size/MD5 checksum: 13433728 245c4ec2754177b5082d809733dc6e28 http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.4.21.2~dfsg-3+lenny1_mips.deb Size/MD5 checksum: 2464570 6095542e8813aa8b64d025fe6c23697d powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.4.21.2~dfsg-3+lenny1_powerpc.deb Size/MD5 checksum: 2806054 30cba312761b5b442ec3fbecf457e2c2 http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.4.21.2~dfsg-3+lenny1_powerpc.deb Size/MD5 checksum: 391488 ccb3c29a722a0a375aac06bd5937902c http://security.debian.org/pool/updates/main/a/asterisk/asterisk-dbg_1.4.21.2~dfsg-3+lenny1_powerpc.deb Size/MD5 checksum: 13267248 e867f0f519ddf844b366739c62a88869 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.4.21.2~dfsg-3+lenny1_sparc.deb Size/MD5 checksum: 2490436 434bf630723e57b97273291e780953c3 http://security.debian.org/pool/updates/main/a/asterisk/asterisk-dbg_1.4.21.2~dfsg-3+lenny1_sparc.deb Size/MD5 checksum: 12742386 004d7b7016529815d21e2a086c20c718 http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.4.21.2~dfsg-3+lenny1_sparc.deb Size/MD5 checksum: 389034 601d2368a23b3ee43385b8c28928ba24 These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show ' and http://packages.debian.org/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAksniOkACgkQ62zWxYk/rQf4YgCePUowSZn5DwLJ98DvEL7T1mvC hZYAnicdU3gpH6ErJT0EG2JRC33uaHEv =qf6k -----END PGP SIGNATURE-----