Bug#457063: asterisk: CVE-2007-6430 remote unauthenticated sessions

2007-12-19 Thread Nico Golde
Package: asterisk
Severity: grave
Tags: security

Hi,
the following CVE (Common Vulnerabilities  Exposures) id was
published for asterisk.

CVE-2007-6430[0]:
| Due to the way database-based registrations (realtime)
| are processed, IP addresses are not checked when the
| username is correct and there is no password. An
| attacker may impersonate any user using host-based
| authentication without a secret, simply by guessing the
| username of that user. This is limited in scope to
| administrators who have set up the registration database
| (realtime) for authentication and are using only
| host-based authentication, not passwords. However, both
| the SIP and IAX protocols are affected.

If you fix this vulnerability please also include the CVE id
in your changelog entry.

For further information:
[0] http://downloads.digium.com/pub/security/AST-2007-027.html

Kind regards
Nico

--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.


pgp819ZJpmcrS.pgp
Description: PGP signature


Bug#457063: asterisk: CVE-2007-6430 remote unauthenticated sessions

2007-12-19 Thread Faidon Liambotis
Nico Golde wrote:
 CVE-2007-6430[0]:
 | Due to the way database-based registrations (realtime)
 | are processed, IP addresses are not checked when the
 | username is correct and there is no password. An
 | attacker may impersonate any user using host-based
 | authentication without a secret, simply by guessing the
 | username of that user. This is limited in scope to
 | administrators who have set up the registration database
 | (realtime) for authentication and are using only
 | host-based authentication, not passwords. However, both
 | the SIP and IAX protocols are affected.
This is affecting unstable and stable. oldstable is not affected.

I'll upload 1.4.16 (.1 due soon probably, since .16 has a major bug) to
unstable probably tomorrow or the day after that.

For stable, I don't think that the vulnerability is serious enough to
warrant a DSA. Maybe s-p-u is a better candidate?

Regards,
Faidon



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#457063: asterisk: CVE-2007-6430 remote unauthenticated sessions

2007-12-19 Thread Moritz Muehlenhoff
On Wed, Dec 19, 2007 at 08:52:10PM +0200, Faidon Liambotis wrote:
 Nico Golde wrote:
  CVE-2007-6430[0]:
  | Due to the way database-based registrations (realtime)
  | are processed, IP addresses are not checked when the
  | username is correct and there is no password. An
  | attacker may impersonate any user using host-based
  | authentication without a secret, simply by guessing the
  | username of that user. This is limited in scope to
  | administrators who have set up the registration database
  | (realtime) for authentication and are using only
  | host-based authentication, not passwords. However, both
  | the SIP and IAX protocols are affected.
 This is affecting unstable and stable. oldstable is not affected.
 
 I'll upload 1.4.16 (.1 due soon probably, since .16 has a major bug) to
 unstable probably tomorrow or the day after that.
 
 For stable, I don't think that the vulnerability is serious enough to
 warrant a DSA.

I agree that a DSA is not warranted.

  Maybe s-p-u is a better candidate?

s-p-u handling is sluggish, the next asterisk DSA will likely
appear before it enters the next point release.

A more serious asterisk issue will surely appear, so let's just
postpone it.

Cheers,
Moritz




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#457063: asterisk: CVE-2007-6430 remote unauthenticated sessions

2007-12-19 Thread Nico Golde
Hi Faidon,
* Faidon Liambotis [EMAIL PROTECTED] [2007-12-19 20:18]:
 Nico Golde wrote:
  CVE-2007-6430[0]:
  | Due to the way database-based registrations (realtime)
  | are processed, IP addresses are not checked when the
  | username is correct and there is no password. An
  | attacker may impersonate any user using host-based
  | authentication without a secret, simply by guessing the
  | username of that user. This is limited in scope to
  | administrators who have set up the registration database
  | (realtime) for authentication and are using only
  | host-based authentication, not passwords. However, both
  | the SIP and IAX protocols are affected.
 This is affecting unstable and stable. oldstable is not affected.
 
 I'll upload 1.4.16 (.1 due soon probably, since .16 has a major bug) to
 unstable probably tomorrow or the day after that.
[...] 
Sounds good, thanks for taking care of it.
Kind regards
Nico
-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.


pgpFizsJlLXyP.pgp
Description: PGP signature


Bug#457063: asterisk: CVE-2007-6430 remote unauthenticated sessions

2007-12-19 Thread Luk Claes
Moritz Muehlenhoff wrote:
 On Wed, Dec 19, 2007 at 08:52:10PM +0200, Faidon Liambotis wrote:
 Nico Golde wrote:
 CVE-2007-6430[0]:
 | Due to the way database-based registrations (realtime)
 | are processed, IP addresses are not checked when the
 | username is correct and there is no password. An
 | attacker may impersonate any user using host-based
 | authentication without a secret, simply by guessing the
 | username of that user. This is limited in scope to
 | administrators who have set up the registration database
 | (realtime) for authentication and are using only
 | host-based authentication, not passwords. However, both
 | the SIP and IAX protocols are affected.
 This is affecting unstable and stable. oldstable is not affected.

 I'll upload 1.4.16 (.1 due soon probably, since .16 has a major bug) to
 unstable probably tomorrow or the day after that.

 For stable, I don't think that the vulnerability is serious enough to
 warrant a DSA.
 
 I agree that a DSA is not warranted.
 
  Maybe s-p-u is a better candidate?
 
 s-p-u handling is sluggish, the next asterisk DSA will likely
 appear before it enters the next point release.

Please don't denigrate SRM.

The next point release is planned to happen before the end of the year
or early next year. It's true that it took a long time, though it's not
because we were sluggish. There were some issues with the teams
internals. When they got solved ries crashed and we had to start from
scratch due to no backup being available which we asked for more than
one year. Apparantly the backup was not planned because of some backup
policy noone knew about. Those three problems are fixed in the meantime,
so without any unforseeable misfortune a release will happen very soon.

Cheers

Luk



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]