oss-security - CVE Request - Asterisk (AST-2009-008.html)

Openwall
Follow @Openwall on Twitter for new release announcements and other news [<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <4AF2A13F.6050108@redhat.com>
Date: 2009年11月05日 10:56:15 +0100
From: Jan Lieskovsky <jlieskov@...hat.com>
To: "Steven M. Christey" <coley@...us.mitre.org>
CC: oss-security <oss-security@...ts.openwall.com>
Subject: CVE Request - Asterisk (AST-2009-008.html)
Hello Steve, vendors,
 Asterisk upstream has recently published two security advisories:
a, SIP responses expose valid usernames
 http://downloads.asterisk.org/pub/security/AST-2009-008.html
 This is similar issue to AST-2009-003.html (CVE-2008-3903)
 http://downloads.asterisk.org/pub/security/AST-2009-003.html
 But according to the patches:
 http://downloads.digium.com/pub/asa/AST-2009-003-1.6.1.diff.txt (AST-2009-003) vs
 http://downloads.asterisk.org/pub/security/AST-2009-008-1.6.1.diff.txt (AST-2009-003)
 it desires a new CVE id. Could you allocate one?
The second issue (b,) already got an CVE id of CVE-2008-7220.
b, Cross-site AJAX request vulnerability (CVE-2008-7220)
 http://downloads.asterisk.org/pub/security/AST-2009-009.html
Thanks && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.

AltStyle によって変換されたページ (->オリジナル) /