-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

            ESB-2005.0882 -- Assurance - Vulnerability Advisory
                     Asterisk PBX Comedian Voice Mail
                              7 November 2005

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Asterisk Versions <= 1.0.9
                   Asterisk Beta Versions <= 1.2.0-beta1
                   Asterisk @ Home Versions <= 1.5
                   Asterisk @ Home Beta Versions <= 2.0 Beta 4 
Publisher:         Assurance
Operating System:  Linux variants
                   BSD variants
                   Mac OS X
Impact:            Access Confidential Data
Access:            Existing Account

Original Bulletin: 
  http://www.assurance.com.au/advisories/200511-asterisk.txt

- --------------------------BEGIN INCLUDED TEXT--------------------

Assurance.com.au - Vulnerability Advisory
- -----------------------------------------------
Release Date:
 07-Nov-2005

Software:
 Asterisk Web-VoiceMail (Comedian VoiceMail)
 http://www.asterisk.org/

 Asterisk is a complete PBX in software. It runs on Linux, BSD and MacOSX 
 and provides all of the features you would expect from a PBX and more. 
 Asterisk does voice over IP in many protocols, and can interoperate with 
 almost all standards-based telephony equipment using relatively inexpensive 
 hardware.

Versions affected:
 Asterisk Versions <= 1.0.9
 Asterisk Beta Versions <= 1.2.0-beta1
 Asterisk @ Home Versions <= 1.5
 Asterisk @ Home Beta Versions <= 2.0 Beta 4 

Vulnerability discovered:
 A vulnerability in the voicemail retrieval system allows an authenticated
 user to download any .wav/.WAV file from the system, including other
 users voicemail messages.

Vulnerability impact:
 Low - Insecure web-ui causes breach of privacy

Vulnerability information:
 vmail.cgi doesn't clean a parameter passed by the web user which is
 later used to open a file and return a raw stream to the user.
 This allows any authenticated user of the voicemail system to listen to
 other peoples messages, or to open any file with the extension .wav/.WAV
 on the system.

Solution:
 Asterisk has released patches for the vulnerabilities.
 Ensure you are running Asterisk versions > 1.0.9 / 1.2.0-beta1
 Ensure you are running Asterisk @ Home versions > 1.5 / 2.0 beta 4

References:
 Assurance.com.au advisory
 http://www.assurance.com.au/advisories/200511-asterisk.txt

 Asterisk advisory note
 http://www.asterisk.org/changelog

Credit:
 Adam Pointon of Assurance.com.au
 http://www.assurance.com.au/

Disclosure timeline:
 17-Oct-2005 - Discovered during a quick audit of the asterisk web ui
 18-Oct-2005 - Email sent to support and the primary author
 18-Oct-2005 - Immediate response received
 31-Oct-2005 - Patched version committed to CVS
 07-Nov-2005 - Advisory released

About us:
 Assurance.com.au is a specialised information security consultancy.
 Our mission is to help organisations identify and secure their information
 assets. Our expertise concentrates in security architecture design,
 managed security and professional services in security testing/review
 and compliance.

 Supporting this approach are professional and managed services in the
 following areas:

   * Compliance Services - Penetration testing, security reviews, 
     compliance and audit services
   * Wireless and mobility solutions - design, installation and management
     of IEEE 802.11a/b/g (WiFi), tele-mobility and other wireless solutions
   * UNIX-like systems, network and security advice and consulting

 Assurance.com.au also provides organisations with services to support
 compliance to legislative, public and internal/private standards. While
 primarily specialising in Australian & New Zealand standards efforts
 Assurance.com.au also works with other international standards related
 to information security

 These include:
  * ISO/IEC 17799:*, AS/NZS 17799:*, BS7799
  * ISO 15408 (Common Criteria), ITSEC, TCSEC
  * ISO 13569, ISO 11131
  * ACSI33, AS2805, AS3806, AS4360, AS4539, AS8018, HB231:2001, NPP4 
    (privacy)
  * Sarbanes-Oxley

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBQ27qtSh9+71yA2DNAQIVQwP/SXjnvrxvzZ1jVJuKxxRSE1hZkUb/GZFt
4NnS4unIEU/47LzlLs7sRnhNsGbGkYqMAnWQZgtQV3vVvxWaXnjgdgYXSXp0eVPB
amFQF7mTsCXxX3gwS9+tYgvCt54OCMzYNo07BgnTPCs+WE87XTVGeqvg6b+B+L/i
Ep501sju7IY=
=9TWw
-----END PGP SIGNATURE-----