asterisk stable update for CVE-2008-3903

Giuseppe Iuculano giuseppe at iuculano.it
Wed Jun 3 17:37:03 UTC 2009


Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for asterisk some time ago.

CVE-2008-3903[0]:
| Asterisk Open Source 1.2.x before 1.2.32, 1.4.x before 1.4.24.1, and
| 1.6.0.x before 1.6.0.8; Asterisk Business Edition A.x.x, B.x.x before
| B.2.5.8, C.1.x.x before C.1.10.5, and C.2.x.x before C.2.3.3; s800i
| 1.3.x before 1.3.0.2; and Trixbox PBX 2.6.1, when Digest
| authentication and authalwaysreject are enabled, generates different
| responses depending on whether a SIP username is valid, which allows
| remote attackers to enumerate valid usernames.


Unfortunately the vulnerability described above is not important enough
to get it fixed via regular security update in Debian stable. It does
not warrant a DSA.

However it would be nice if this could get fixed via a regular point update[1].
Please contact the release team for this.

This is an automatically generated mail, in case you are already working on an
upgrade this is of course pointless.


For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3903
    http://security-tracker.debian.net/tracker/CVE-2008-3903
[1] http://www.debian.org/doc/developers-reference/pkgs.html#upload-stable

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 197 bytes
Desc: OpenPGP digital signature
URL: <http://lists.alioth.debian.org/pipermail/pkg-voip-maintainers/attachments/20090603/528646a5/attachment.pgp>


More information about the Pkg-voip-maintainers mailing list