Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 5 Nov 2009 12:35:09 -0500 (EST)
From: Josh Bressers <>
Cc: "Steven M. Christey" <>
Subject: Re: CVE Request - Asterisk (AST-2009-008.html)

CVE-2009-3727 Asterisk AST-2009-008

    Asterisk Open Source 1.2.x before 1.2.35, 1.4.x before, and
    1.6.0.x before; Asterisk Business Edition A.x.x, B.x.x before
    B.2.5.12, C.1.x.x before C.2.x.x before C.2.4.5 and C.3.2.2; s800i 1.3.x
    before; Generates different responses when a specially crafted
    REGISTER message is sent twice depending on whether a SIP username is
    valid. This allows remote attackers to enumerate valid usernames.



----- "Jan Lieskovsky" <> wrote:

> Hello Steve, vendors,
>    Asterisk upstream has recently published two security advisories:
> a, SIP responses expose valid usernames
>     This is similar issue to AST-2009-003.html (CVE-2008-3903)
>     But according to the patches:
> (AST-2009-003) vs
> (AST-2009-003)
>     it desires a new CVE id. Could you allocate one?
> The second issue (b,) already got an CVE id of CVE-2008-7220.
> b, Cross-site AJAX request vulnerability (CVE-2008-7220)
> Thanks && Regards, Jan.
> --
> Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.