Asterisk Project Security Advisory - AST-2007-023
±-----------------------------------------------------------------------+
| Product | Asterisk-Addons |
|--------------------±--------------------------------------------------|
| Summary | SQL Injection Vulnerability in cdr_addon_mysql |
|--------------------±--------------------------------------------------|
| Nature of Advisory | SQL Injection |
|--------------------±--------------------------------------------------|
| Susceptibility | Remote Unauthenticated Sessions |
|--------------------±--------------------------------------------------|
| Severity | Minor |
|--------------------±--------------------------------------------------|
| Exploits Known | Yes |
|--------------------±--------------------------------------------------|
| Reported On | October 16, 2007 |
|--------------------±--------------------------------------------------|
| Reported By | Humberto Abdelnur <humberto.abdelnur AT loria DOT |
| | fr> |
|--------------------±--------------------------------------------------|
| Posted On | October 16, 2007 |
|--------------------±--------------------------------------------------|
| Last Updated On | October 16, 2007 |
|--------------------±--------------------------------------------------|
| Advisory Contact | Tilghman Lesher <tlesher AT digium DOT com> |
|--------------------±--------------------------------------------------|
| CVE Name | CVE-2007-5488 |
±-----------------------------------------------------------------------+
±-----------------------------------------------------------------------+
| Description | The source and destination numbers for a given call are |
| | not correctly escaped by the cdr_addon_mysql module when |
| | inserting a record. Therefore, a carefully crafted |
| | destination number sent to an Asterisk system running |
| | cdr_addon_mysql could escape out of a SQL data field and |
| | create another query. This vulnerability is made all the |
| | more severe if a user were using realtime data, since |
| | the data may exist in the same database as the inserted |
| | call detail record, thus creating all sorts of possible |
| | data corruption and invalidation issues. |
±-----------------------------------------------------------------------+
±-----------------------------------------------------------------------+
| Resolution | The Asterisk-addons package is not distributed with |
| | Asterisk, nor is it installed by default. The module may |
| | be either disabled or upgraded to fix this issue. |
±-----------------------------------------------------------------------+
±-----------------------------------------------------------------------+
Affected Versions |
---|
Product |
----------------------±------------±---------------------------------- |
Asterisk Open Source |
----------------------±------------±---------------------------------- |
Asterisk Open Source |
----------------------±------------±---------------------------------- |
Asterisk Open Source |
----------------------±------------±---------------------------------- |
Asterisk Business |
Edition |
----------------------±------------±---------------------------------- |
Asterisk Business |
Edition |
----------------------±------------±---------------------------------- |
AsteriskNOW |
----------------------±------------±---------------------------------- |
Asterisk Appliance |
Developer Kit |
----------------------±------------±---------------------------------- |
s800i (Asterisk |
Appliance) |
±-----------------------------------------------------------------------+ |
±-----------------------------------------------------------------------+
Corrected In |
---|
Product |
----------------------------------------±------------------------------ |
Asterisk-Addons |
----------------------------------------±------------------------------ |
Asterisk-Addons |
----------------------------------------±------------------------------ |
±-----------------------------------------------------------------------+ |
±-----------------------------------------------------------------------+
| Links | |
±-----------------------------------------------------------------------+
±-----------------------------------------------------------------------+
| Asterisk Project Security Advisories are posted at |
| http://www.asterisk.org/security. |
| |
| This document may be superseded by later versions; if so, the latest |
| version will be posted at |
| http://downloads.digium.com/pub/security/AST-2007-023.pdf and |
| http://downloads.digium.com/pub/security/AST-2007-023.html. |
±-----------------------------------------------------------------------+
±-----------------------------------------------------------------------+
Revision History |
---|
Date |
-----------------±----------------------±----------------------------- |
2007-10-16 |
-----------------±----------------------±----------------------------- |
2007-10-16 |
±-----------------------------------------------------------------------+ |
Asterisk Project Security Advisory - 2007-AST-023
Copyright (c) 2007 Digium, Inc. All Rights Reserved.
Permission is hereby granted to distribute and publish this advisory in its
original, unaltered form.