CVE-2008-1390
Published: 24 March 2008
The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses.
Notes
Author | Note |
---|---|
jdstrand | 1.2 not affected |
Priority
Status
Package | Release | Status |
---|---|---|
asterisk Launchpad, Ubuntu, Debian |
dapper |
Not vulnerable
|
edgy |
Not vulnerable
|
|
feisty |
Not vulnerable
|
|
gutsy |
Ignored
(end of life, was needed)
|
|
hardy |
Released
(1:1.4.17~dfsg-2ubuntu1.1)
|
|
intrepid |
Not vulnerable
(1:1.4.21.2~dfsg-1ubuntu3)
|
|
jaunty |
Not vulnerable
(1:1.4.21.2~dfsg-3ubuntu2)
|
|
upstream |
Not vulnerable
(1.4.19-rc3)
|
|
Patches: upstream: http://downloads.digium.com/pub/security/AST-2008-005-1.4.patch |