Bug 765773 (AST-2011-013, CVE-2011-4597)

Summary: CVE-2011-4597 asterisk: Possible to enumerate SIP usernames when general and user/peer NAT settings differed (AST-2011-013)
Product: [Other] Security Response Reporter: Jan Lieskovsky <jlieskov>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: itamar, jeff, rbryant
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-04-05 00:31:34 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 765778, 765779    
Bug Blocks:    

Description Jan Lieskovsky 2011-12-09 11:40:20 UTC
An information disclosure flaw was found in the way Asterisk handled UDP requests in configurations using network address translation (NAT) for the SIP protocol. When the general configuration file section and user / peer configuration file section NAT settings differed, it was possible to enumerate SIP usernames if the request was sent to different port as that, specified in the Via header.

References:
[1] http://www.asterisk.org/node/51693
[2] http://downloads.asterisk.org/pub/security/AST-2011-013.pdf
[3] http://lists.digium.com/pipermail/asterisk-dev/2011-November/thread.html#52191
[4] https://bugs.gentoo.org/show_bug.cgi?id=394095

Upstream bug report:
[5] https://issues.asterisk.org/jira/browse/ASTERISK-18862

Upstream review board request:
[6] https://reviewboard.asterisk.org/r/1591/

Upstream patch (for 1.8 branch):
[7] http://svnview.digium.com/svn/asterisk?view=revision&sortby=date&revision=345828

Comment 1 Jan Lieskovsky 2011-12-09 11:44:16 UTC
This issue affects the versions of the asterisk package, as shipped with Fedora release of 15 and 16. Please schedule an update.

--

This issue affects the version of the asterisk package, as shipped with Fedora EPEL 6. Please schedule an update.

Comment 2 Jan Lieskovsky 2011-12-09 12:02:35 UTC
CVE Request:
http://www.openwall.com/lists/oss-security/2011/12/09/3

Comment 3 Jan Lieskovsky 2011-12-09 12:04:04 UTC
Created asterisk tracking bugs for this issue

Affects: fedora-all [bug 765778]
Affects: epel-6 [bug 765779]

Comment 4 Vincent Danen 2011-12-09 18:05:13 UTC
This was assigned the name CVE-2011-4597.

Comment 5 Fedora Update System 2012-03-31 03:09:59 UTC
asterisk-1.8.10.1-1.fc15 has been pushed to the Fedora 15 stable repository.  If problems still persist, please make note of it in this bug report.