CVE-2015-3008

Priority
Description
Asterisk Open Source 1.8 before 1.8.32.3, 11.x before 11.17.1, 12.x before
12.8.2, and 13.x before 13.3.2 and Certified Asterisk 1.8.28 before
1.8.28-cert5, 11.6 before 11.6-cert11, and 13.1 before 13.1-cert2, when
registering a SIP TLS device, does not properly handle a null byte in a
domain name in the subject's Common Name (CN) field of an X.509
certificate, which allows man-in-the-middle attackers to spoof arbitrary
SSL servers via a crafted certificate issued by a legitimate Certification
Authority.
Notes
Package
Upstream:released (1.8.32.3, 11.17.1, 13.3.2)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (1:13.18.3~dfsg-1ubuntu4)
Ubuntu 19.10 (Eoan Ermine):not-affected (1:13.20.0~dfsg-1)
Ubuntu 20.04 (Focal Fossa):not-affected (1:13.20.0~dfsg-1)
Patches:
Upstream:http://downloads.asterisk.org/pub/security/AST-2015-003-1.8.diff
Upstream:http://downloads.asterisk.org/pub/security/AST-2015-003-11.diff
Upstream:http://downloads.asterisk.org/pub/security/AST-2015-003-13.diff
More Information

Updated: 2020-04-24 03:18:06 UTC (commit d3f8a6ed481830fb100109a132bef581fc4176fe)