what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

200511-asterisk.txt

200511-asterisk.txt
Posted Nov 8, 2005
Authored by Adam Pointon | Site assurance.com.au

A vulnerability in the voicemail retrieval system for the Asterisk PBX software allows an authenticated user to download any .wav/.WAV file from the system, including other users' voicemail messages. Versions affected: Asterisk versions 1.0.9 and below, Asterisk Beta versions 1.2.0-beta1 and below, Asterisk @ Home versions 1.5 and below, and Asterisk @ Home Beta versions 2.0 Beta 4 and below.

tags | exploit
SHA-256 | f7a5df0e22275c8fdebf7ed2d4e110a0ea24464a098ba12734cae3db12a6c84b

200511-asterisk.txt

Change Mirror Download
Assurance.com.au - Vulnerability Advisory
-----------------------------------------------
Release Date:
07-Nov-2005

Software:
Asterisk Web-VoiceMail (Comedian VoiceMail)
https://www.asterisk.org/

Asterisk is a complete PBX in software. It runs on Linux, BSD and MacOSX and
provides all of the features you would expect from a PBX and more.
Asterisk does voice over IP in many protocols, and can interoperate with almost
all standards-based telephony equipment using relatively inexpensive hardware.

Versions affected:
Asterisk Versions <= 1.0.9
Asterisk Beta Versions <= 1.2.0-beta1
Asterisk @ Home Versions <= 1.5
Asterisk @ Home Beta Versions <= 2.0 Beta 4


Vulnerability discovered:

A vulnerability in the voicemail retrieval system allows an authenticated
user to download any .wav/.WAV file from the system, including other
users voicemail messages.

Vulnerability impact:

Low - Insecure web-ui causes breach of privacy

Vulnerability information

vmail.cgi doesn't clean a parameter passed by the web user which is
later used to open a file and return a raw stream to the user.
This allows any authenticated user of the voicemail system to listen to
other peoples messages, or to open any file with the extension .wav/.WAV
on the system.

Example:
https://asterisk.example.org/cgi-bin/vmail.cgi?action=audio& \
folder=../201/INBOX&mailbox=200&context=default&password=12345 \
&msgid=0001&format=wav

This will return /var/spool/asterisk/voicemail/default/201/INBOX/msg0001.wav
when logged in as the 'extension 200' user.

Solution:
Asterisk has released patches for the vulnerabilities.
Ensure you are running Asterisk versions > 1.0.9 / 1.2.0-beta1
Ensure you are running Asterisk @ Home versions > 1.5 / 2.0 beta 4

References:
Assurance.com.au advisory
https://www.assurance.com.au/advisories/200511-asterisk.txt

Asterisk advisory note
https://www.asterisk.org/changelog

Credit:
Adam Pointon of Assurance.com.au
https://www.assurance.com.au/

Disclosure timeline:
17-Oct-2005 - Discovered during a quick audit of the asterisk web ui
18-Oct-2005 - Email sent to support and the primary author
18-Oct-2005 - Immediate response received
31-Oct-2005 - Patched version committed to CVS
07-Nov-2005 - Advisory released

About us:
Assurance.com.au is a specialised information security consultancy.
Our mission is to help organisations identify and secure their information
assets. Our expertise concentrates in security architecture design,
managed security and professional services in security testing/review
and compliance.

Supporting this approach are professional and managed services in the
following areas:

* Compliance Services - Penetration testing, security reviews,
compliance and audit services
* Wireless and mobility solutions - design, installation and management
of IEEE 802.11a/b/g (WiFi), tele-mobility and other wireless solutions
* UNIX-like systems, network and security advice and consulting

Assurance.com.au also provides organisations with services to support
compliance to legislative, public and internal/private standards. While
primarily specialising in Australian & New Zealand standards efforts
Assurance.com.au also works with other international standards related
to information security

These include:
* ISO/IEC 17799:*, AS/NZS 17799:*, BS7799
* ISO 15408 (Common Criteria), ITSEC, TCSEC
* ISO 13569, ISO 11131
* ACSI33, AS2805, AS3806, AS4360, AS4539, AS8018, HB231:2001, NPP4 (privacy)
* Sarbanes-Oxley




Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close