---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Asterisk Predictable HTTP Manager ID Weakness SECUNIA ADVISORY ID: SA29449 VERIFY ADVISORY: http://secunia.com/advisories/29449/ CRITICAL: Not critical IMPACT: Hijacking WHERE: >From local network SOFTWARE: Asterisk Business Edition 2.x http://secunia.com/product/14820/ Asterisk 1.x http://secunia.com/product/2155/ Asterisk Appliance Developer Kit 0.x http://secunia.com/product/14821/ DESCRIPTION: Dino A. Dai Zovi has reported a weakness in Asterisk, which can be exploited by malicious people to hijack a user session. The weakness is caused due to the HTTP Manager ID being predictable. This can be exploited to hijack a manager's session by guessing the session ID. The weakness is reported in: * Asterisk Open Source 1.4.x prior to 1.4.19-rc3 * Asterisk Open Source 1.6.x prior to 1.6.0-beta6 * Asterisk Business Edition C.x.x prior to C.1.6 * AsteriskNOW prior to 1.0.2 * Asterisk Appliance Developer Kit prior to SVN revision 104704 * s800i (Asterisk Appliance) prior to version 1.1.0.2 SOLUTION: Asterisk Open Source 1.4.x: Fixed in version 1.4.19-rc3 Asterisk Open Source 1.6.x: Fixed in version 1.6.0-beta6 Asterisk Business Edition C.x.x: Fixed in version C.1.6 AsteriskNOW: Update to 1.0.2. Asterisk Appliance Developer Kit: Fixed with SVN revision 104704. s800i (Asterisk Appliance): Update to version 1.1.0.2 PROVIDED AND/OR DISCOVERED BY: Dino A. Dai Zovi ORIGINAL ADVISORY: http://downloads.digium.com/pub/security/AST-2008-005.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------