安全研究

安全漏洞
Asterisk基于主机认证绕过安全限制漏洞

发布日期:2007-12-18
更新日期:2008-03-21

受影响系统:
Asterisk Asterisk 1.4.x
Asterisk Asterisk 1.2.x
Asterisk Business Edition C.x.x
Asterisk Business Edition B.x.x
不受影响系统:
Asterisk Asterisk 1.4.16
Asterisk Asterisk 1.2.16
Asterisk Business Edition C.1.0-beta8  
Asterisk Business Edition B.2.3.6
描述:
BUGTRAQ  ID: 26928
CVE(CAN) ID: CVE-2007-6430

Asterisk是开放源码的软件PBX,支持各种VoIP协议和设备。

Asterisk在处理基于数据库注册(realtime)时,如果用户名正确但没有口令的话,就不会检查IP地址,因此攻击者只要猜测到用户名的话,无需口令就可以扮演为使用基于主机认证的用户。

<*来源:Tilghman Lesher (tlesher@digium.com
  
  链接:http://secunia.com/advisories/28149
        http://marc.info/?l=bugtraq&m=119800953801613&w=2
        http://www.debian.org/security/2008/dsa-1525
        http://security.gentoo.org/glsa/glsa-200804-13.xml
*>

建议:
临时解决方法:

* 对所有注册(realtime)数据库中的用户和对等端设置口令。

厂商补丁:

Debian
------
Debian已经为此发布了一个安全公告(DSA-1525-1)以及相应补丁:
DSA-1525-1:New asterisk packages fix several vulnerabilities
链接:http://www.debian.org/security/2008/dsa-1525

补丁下载:

Source archives:

http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.2.13~dfsg-2etch3.diff.gz
Size/MD5 checksum:   181527 6a98d3db7fd54a5dd082c692f3e50042
http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.2.13~dfsg.orig.tar.gz
Size/MD5 checksum:  3835589 f8ee088b2e4feffe2b35d78079f90b69
http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.2.13~dfsg-2etch3.dsc
Size/MD5 checksum:     1488 181da0b7d5a604cd79be518e662b049b

Architecture independent packages:

http://security.debian.org/pool/updates/main/a/asterisk/asterisk-doc_1.2.13~dfsg-2etch3_all.deb
Size/MD5 checksum:  1500218 de67182dd31aef4878322327034ae0ae
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-sounds-main_1.2.13~dfsg-2etch3_all.deb
Size/MD5 checksum:  1504782 6096881223aafe96ce1285b9be1a97ad
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-config_1.2.13~dfsg-2etch3_all.deb
Size/MD5 checksum:   131832 99911d22fb5fbf7f0520d28f0cd21af7
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-web-vmail_1.2.13~dfsg-2etch3_all.deb
Size/MD5 checksum:    73928 0eaff6b096a03f0830a965ed21671557
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-dev_1.2.13~dfsg-2etch3_all.deb
Size/MD5 checksum:   170126 26798a8026d05a9843a63fa3ac28488e
http://security.debian.org/pool/updates/main/a/asterisk/asterisk_1.2.13~dfsg-2etch3_all.deb
Size/MD5 checksum:   146658 8fd6ec949bdd4fc072b4244f6c97642a

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/a/asterisk/asterisk-bristuff_1.2.13~dfsg-2etch3_alpha.deb
Size/MD5 checksum:  1934760 0999adcecf044475a12d9300c8dc2c48
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.2.13~dfsg-2etch3_alpha.deb
Size/MD5 checksum:   137160 f1a2f55ed07f19114ea44639aa2be4a9
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-classic_1.2.13~dfsg-2etch3_alpha.deb
Size/MD5 checksum:  1898628 637feeb1ac1b25f28330b808bd0597a1

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/a/asterisk/asterisk-bristuff_1.2.13~dfsg-2etch3_amd64.deb
Size/MD5 checksum:  1780328 b2c4b1c62ebc4dc13a1ea53a5c842e96
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.2.13~dfsg-2etch3_amd64.deb
Size/MD5 checksum:   133354 1f58ef3241222af34a9ca717eff2c052
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-classic_1.2.13~dfsg-2etch3_amd64.deb
Size/MD5 checksum:  1745634 bd5f2ee7c79247ee6f5944076b9f3442

arm architecture (ARM)

http://security.debian.org/pool/updates/main/a/asterisk/asterisk-bristuff_1.2.13~dfsg-2etch3_arm.deb
Size/MD5 checksum:  1701818 9153b33c47b4eead77107cfdeb0055ae
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-classic_1.2.13~dfsg-2etch3_arm.deb
Size/MD5 checksum:  1668398 a8d2cb491be92fbdb93ebda9e2f42c97
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.2.13~dfsg-2etch3_arm.deb
Size/MD5 checksum:   136514 3e64fa9e5d988a10244b9122b20c9454

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.2.13~dfsg-2etch3_hppa.deb
Size/MD5 checksum:   145336 7ab22793ce0794bd2058bed710055bed
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-bristuff_1.2.13~dfsg-2etch3_hppa.deb
Size/MD5 checksum:  1869966 38318b647fe2fd8e083b50f6b288d8aa
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-classic_1.2.13~dfsg-2etch3_hppa.deb
Size/MD5 checksum:  1830986 8b026f468a5a60aefeed67a43b04e759

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/a/asterisk/asterisk-classic_1.2.13~dfsg-2etch3_i386.deb
Size/MD5 checksum:  1616600 65c4d9ef59dc45d7ab4eb91c8497a283
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-bristuff_1.2.13~dfsg-2etch3_i386.deb
Size/MD5 checksum:  1650014 f119c7b228725648f953b84d2a2ee33c
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.2.13~dfsg-2etch3_i386.deb
Size/MD5 checksum:   131048 539ce1eb62c36817f34e9ca0cbfb84d7

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.2.13~dfsg-2etch3_ia64.deb
Size/MD5 checksum:   149818 695f2f9898e033f7623cb084bfa12b6d
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-classic_1.2.13~dfsg-2etch3_ia64.deb
Size/MD5 checksum:  2349560 98635c3fb790ff46ea1c264cd8bec307
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-bristuff_1.2.13~dfsg-2etch3_ia64.deb
Size/MD5 checksum:  2395588 f517fd2e2bd3138fa3d8fbeafb0cb32d

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.2.13~dfsg-2etch3_mips.deb
Size/MD5 checksum:   130306 36fdfbc5bc139efd896adacb7938f100
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-bristuff_1.2.13~dfsg-2etch3_mips.deb
Size/MD5 checksum:  1720394 3941173413eafc9fb6fa534f43fe2d3b
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-classic_1.2.13~dfsg-2etch3_mips.deb
Size/MD5 checksum:  1688738 d27395cebf31c20bd8e175c62652f170

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/a/asterisk/asterisk-classic_1.2.13~dfsg-2etch3_mipsel.deb
Size/MD5 checksum:  1664252 e30c152fef3fa37ce958fb4d463e4b09
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.2.13~dfsg-2etch3_mipsel.deb
Size/MD5 checksum:   129804 2624ae4a755631fb733032a1c524daff
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-bristuff_1.2.13~dfsg-2etch3_mipsel.deb
Size/MD5 checksum:  1696296 04e9239cc4109971f3651fc95d5db5ea

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.2.13~dfsg-2etch3_powerpc.deb
Size/MD5 checksum:   133180 08012ba08692b33b3f61ad01508288b1
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-classic_1.2.13~dfsg-2etch3_powerpc.deb
Size/MD5 checksum:  1825580 631dfe6dfb72159b05d9e049995a1cce
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-bristuff_1.2.13~dfsg-2etch3_powerpc.deb
Size/MD5 checksum:  1864102 c5d24242137540588cbcdd2c330b08e6

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/a/asterisk/asterisk-classic_1.2.13~dfsg-2etch3_s390.deb
Size/MD5 checksum:  1744876 f4b432e9ea83929766d375aa8b859261
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-bristuff_1.2.13~dfsg-2etch3_s390.deb
Size/MD5 checksum:  1780834 5f855e02a7b83eb9b786a2faa5133945
http://security.debian.org/pool/updates/main/a/asterisk/asterisk-h323_1.2.13~dfsg-2etch3_s390.deb
Size/MD5 checksum:   136696 6693c944ceeff566de18bac7a10c9ed2

补丁安装方法:

1. 手工安装补丁包:

  首先,使用下面的命令来下载补丁软件:
  # wget url  (url是补丁下载链接地址)

  然后,使用下面的命令来安装补丁:  
  # dpkg -i file.deb (file是相应的补丁名)

2. 使用apt-get自动安装补丁包:

   首先,使用下面的命令更新内部数据库:
   # apt-get update
  
   然后,使用下面的命令安装更新软件包:
   # apt-get upgrade

Gentoo
------
Gentoo已经为此发布了一个安全公告(GLSA-200804-13)以及相应补丁:
GLSA-200804-13:Asterisk: Multiple vulnerabilities
链接:http://security.gentoo.org/glsa/glsa-200804-13.xml

所有Asterisk用户都应升级到最新版本:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=net-misc/asterisk-1.2.27"

Asterisk
--------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

http://www.asterisk.org/

浏览次数:3086
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障