OpenSER 1.2.2 does not verify the Digest authentication header URI against the Request URI in SIP messages, which allows remote attackers to use sniffed Digest authentication credentials to call arbitrary telephone numbers or spoof caller ID (aka "toll fraud and authentication forward attack"). NOTE: Debian disputes this issue, stating that "having the two URIs mismatch is allowed by the standard and happens in some setups for valid reasons.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://secunia.com/advisories/27204 | third party advisory vendor advisory |
http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066581.html | mailing list |
http://www.securityfocus.com/bid/26057 | vdb entry |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446956 | |
http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066694.html | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/37197 | vdb entry |
http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066691.html | mailing list |