Asterisk
Project Security Advisory -
Product |
Asterisk |
Summary |
SIP responses expose valid usernames |
Nature of Advisory |
Information leak |
Susceptibility |
Remote Unauthenticated Sessions |
Severity |
Minor |
Exploits Known |
No |
Reported On |
February 23, 2009 |
Reported By |
Gentoo Linux Project: Kerin Millar ( kerframil on irc.freenode.net ) and Fergal Glynn < FGlynn AT veracode DOT com > |
Posted On |
April 2, 2009 |
Last Updated On |
|
Advisory Contact |
Tilghman Lesher < tlesher AT digium DOT com > |
CVE Name |
CVE-2008-3903 |
Description |
In 2006, the Asterisk maintainers made it more difficult to scan for valid SIP usernames by implementing an option called "alwaysauthreject", which should return a 401 error on all replies which are generated for users which do not exist. While this was sufficient at the time, due to ever increasing compliance with RFC 3261, the SIP specification, that is no longer sufficient as a means towards preventing attackers from checking responses to verify whether a SIP account exists on a machine.
What we have done is to carefully emulate exactly the same responses throughout possible dialogs, which should prevent attackers from gleaning this information. All invalid users, if this option is turned on, will receive the same response throughout the dialog, as if a username was valid, but the password was incorrect.
It is important to note several things. First, this vulnerability is derived directly from the SIP specification, and it is a technical violation of RFC 3261 (and subsequent RFCs, as of this date), for us to return these responses. Second, this attack is made much more difficult if administrators avoided creating all-numeric usernames and especially all-numeric passwords. This combination is extremely vulnerable for servers connected to the public Internet, even with this patch in place. While it may make configuring SIP telephones easier in the short term, it has the potential to cause grief over the long term. |
Resolution |
Upgrade to one of the versions below, or apply one of the patches specified in the Patches section. |
Affected Versions |
||
Product |
Release Series |
|
Asterisk Open Source |
1.2.x |
All versions prior to 1.2.32 |
Asterisk Open Source |
1.4.x |
All versions prior to 1.4.24.1 |
Asterisk Open Source |
1.6.0.x |
All versions prior to 1.6.0.8 |
Asterisk Addons |
1.2.x |
Not affected |
Asterisk Addons |
1.4.x |
Not affected |
Asterisk Addons |
1.6.x |
Not affected |
Asterisk Business Edition |
A.x.x |
All versions |
Asterisk Business Edition |
B.x.x |
All versions prior to B.2.5.8 |
Asterisk Business Edition |
C.1.x.x |
All versions prior to C.1.10.5 |
Asterisk Business Edition |
C.2.x.x |
All versions prior to C.2.3.3 |
AsteriskNOW |
1.5 |
Not affected |
s800i (Asterisk Appliance) |
1.3.x |
All versions prior to 1.3.0.2 |
Corrected In |
|
Product |
Release |
Asterisk Open Source |
1.2.32 |
Asterisk Open Source |
1.4.24.1 |
Asterisk Open Source |
1.6.0.8 |
Asterisk Business Edition |
B.2.5.8 |
Asterisk Business Edition |
C.1.10.5 |
Asterisk Business Edition |
C.2.3.3 |
s800i (Asterisk Appliance) |
1.3.0.2 |
Links |
http://www.faqs.org/rfcs/rfc3261.html |
Asterisk Project Security Advisories are posted at http://www.asterisk.org/security This document may be superseded by later
versions; if so, the latest version will be posted at
http://downloads.digium.com/pub/security/ |
Revision History |
||
Date |
Editor |
Revisions Made |
2009-04-02 |
Tilghman Lesher |
Initial release |
Asterisk
Project Security Advisory -
Copyright
©
Permission is hereby granted
to distribute and publish this advisory in its original, unaltered
form.