Bug 533137 (CVE-2009-3727)
Summary: | CVE-2009-3727 Asterisk: SIP responses expose valid usernames (AST-2009-008) | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Jan Lieskovsky <jlieskov> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | jeff, mjc, vdanen |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://downloads.asterisk.org/pub/security/AST-2009-008.html | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2010-03-01 16:25:15 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Jan Lieskovsky
2009-11-05 10:24:12 UTC
This issue affects latest versions of the Asterisk package, as shipped with Fedora 10 and 11 (asterisk-1.6.0.15-2.fc10, asterisk-1.6.1.8-1.fc11) and as scheduled to appear in Fedora 12 (asterisk-1.6.1.8-1.fc12). Please fix. asterisk-1.6.0.17-2.fc10 has been submitted as an update for Fedora 10. http://admin.fedoraproject.org/updates/asterisk-1.6.0.17-2.fc10 asterisk-1.6.1.9-1.fc11 has been submitted as an update for Fedora 11. http://admin.fedoraproject.org/updates/asterisk-1.6.1.9-1.fc11 This is CVE-2009-3727. asterisk-1.6.1.9-1.fc11 has been pushed to the Fedora 11 stable repository. If problems still persist, please make note of it in this bug report. asterisk-1.6.0.17-2.fc10 has been pushed to the Fedora 10 stable repository. If problems still persist, please make note of it in this bug report. Can this bug be closed now? Yes, Fedora has 1.6.1.12 across the board now, and this was corrected upstream in 1.6.1.9. |