CVE-2015-3008

Published: 10 April 2015

Asterisk Open Source 1.8 before 1.8.32.3, 11.x before 11.17.1, 12.x before 12.8.2, and 13.x before 13.3.2 and Certified Asterisk 1.8.28 before 1.8.28-cert5, 11.6 before 11.6-cert11, and 13.1 before 13.1-cert2, when registering a SIP TLS device, does not properly handle a null byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.

Priority

Medium

Status

Package Release Status
asterisk
Launchpad, Ubuntu, Debian
Upstream
Released (1.8.32.3, 11.17.1, 13.3.2)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(1:13.20.0~dfsg-1)
Ubuntu 20.10 (Groovy Gorilla) Not vulnerable
(1:13.20.0~dfsg-1)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(1:13.20.0~dfsg-1)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(1:13.18.3~dfsg-1ubuntu4)
Ubuntu 16.04 ESM (Xenial Xerus) Ignored
(end of standard support, was needed)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was needed)
Patches:
Upstream: http://downloads.asterisk.org/pub/security/AST-2015-003-1.8.diff
Upstream: http://downloads.asterisk.org/pub/security/AST-2015-003-11.diff
Upstream: http://downloads.asterisk.org/pub/security/AST-2015-003-13.diff