Bug#670180: CVE-2012-2414 CVE-2012-2415 CVE-2012-2416
Tzafrir Cohen
tzafrir.cohen at xorcom.com
Tue Apr 24 06:22:20 UTC 2012
Hi,
Working on it,
On Mon, Apr 23, 2012 at 08:55:58PM +0200, Moritz Muehlenhoff wrote:
> Package: asterisk
> Severity: grave
> Tags: security
At first glance:
>
> CVE-2012-2414 http://downloads.asterisk.org/pub/security/AST-2012-004.html
This is for both Squeeze and Wheezy/Sid.
The recommended fix in Wheezy/Sid is to upgrade to 1.8.11.1 .
This complements AST-2011-006 (and, ahem, copies code from it).
Scope is the same:
* The attacker needs to already have access to a manager interface
account (not unplausable, given that in many cases the security hole
is actually in a web interface that controls Asterisk through the
manager interface).
* This hole only gives extra permissions is the sysadmin did not
provide them (and in just about anywhere people just grant all manager
interface permissions.
But yeah, this should be fixed for those who properly use the manager
interface.
>
> CVE-2012-2415 http://downloads.asterisk.org/pub/security/AST-2012-005.html
Skinny is a nickname for SCCP, a propriatary used by some CISCO phones.
So most people don't need it. That said, the module is enabled by
default and it listens on TCP port 2000 by default.
However exploting this seems to require a configured Skinny device (in
e.g. /etc/asterisk/skinny.conf ), so it probably won't work on most
systems (e.g. a random system that has both UDP port 4569 open and TCP
port 2000 open).
>
> CVE-2012-2416 http://downloads.asterisk.org/pub/security/AST-2012-006.html
This seems to only require the remote attacker to be able to establish a
SIP call to Asterisk. Either being authenticated or as a guest if guests
are allowed.
Only applies to Wheezy/Sid: the code in Squeeze does not seem to support
UPDATE.
--
Tzafrir Cohen
icq#16849755 jabber:tzafrir.cohen at xorcom.com
+972-50-7952406 mailto:tzafrir.cohen at xorcom.com
http://www.xorcom.com iax:guest at local.xorcom.com/tzafrir
More information about the Pkg-voip-maintainers
mailing list