An information disclosure flaw was found in the way Asterisk handled UDP requests in configurations using network address translation (NAT) for the SIP protocol. When the general configuration file section and user / peer configuration file section NAT settings differed, it was possible to enumerate SIP usernames if the request was sent to different port as that, specified in the Via header. References: [1] http://www.asterisk.org/node/51693 [2] http://downloads.asterisk.org/pub/security/AST-2011-013.pdf [3] http://lists.digium.com/pipermail/asterisk-dev/2011-November/thread.html#52191 [4] https://bugs.gentoo.org/show_bug.cgi?id=394095 Upstream bug report: [5] https://issues.asterisk.org/jira/browse/ASTERISK-18862 Upstream review board request: [6] https://reviewboard.asterisk.org/r/1591/ Upstream patch (for 1.8 branch): [7] http://svnview.digium.com/svn/asterisk?view=revision&sortby=date&revision=345828
This issue affects the versions of the asterisk package, as shipped with Fedora release of 15 and 16. Please schedule an update. -- This issue affects the version of the asterisk package, as shipped with Fedora EPEL 6. Please schedule an update.
CVE Request: http://www.openwall.com/lists/oss-security/2011/12/09/3
Created asterisk tracking bugs for this issue Affects: fedora-all [bug 765778] Affects: epel-6 [bug 765779]
This was assigned the name CVE-2011-4597.
asterisk-1.8.10.1-1.fc15 has been pushed to the Fedora 15 stable repository. If problems still persist, please make note of it in this bug report.