Home / vulnerabilitiesPDF  

ASA-2007-011.txt

Posted on 25 April 2007
Source : packetstormsecurity.org Link

 

> Asterisk Project Security Advisory - ASA-2007-011
>
> +------------------------------------------------------------------------+
> | Product | Asterisk |
> |--------------------+---------------------------------------------------|
> | Summary | Multiple problems in SIP channel parser handling |
> | | response codes |
> |--------------------+---------------------------------------------------|
> | Nature of Advisory | Denial of Service |
> |--------------------+---------------------------------------------------|
> | Susceptibility | Remote Unauthenticated Sessions |
> |--------------------+---------------------------------------------------|
> | Severity | Critical |
> |--------------------+---------------------------------------------------|
> | Exploits Known | No |
> |--------------------+---------------------------------------------------|
> | Reported On | March 20, 2007 |
> |--------------------+---------------------------------------------------|
> | Reported By | Mantis user ID 'qwerty1979' |
> |--------------------+---------------------------------------------------|
> | Posted On | April 24, 2007 |
> |--------------------+---------------------------------------------------|
> | Last Updated On | April 24, 2007 |
> |--------------------+---------------------------------------------------|
> | Advisory Contact | kpfleming@digium.com |
> +------------------------------------------------------------------------+
>
> +------------------------------------------------------------------------+
> | Description | Multiple problems have been identified in the Asterisk |
> | | SIP channel driver (chan_sip) when handling response |
> | | packets from other SIP endpoints. |
> | | |
> | | If the response packets did not contain a valid response |
> | | code in the first line of the UDP packet, the Asterisk |
> | | SIP channel driver would fail to parse the packet |
> | | properly and would cause the Asterisk process to die |
> | | with a segmentation fault. This results in all active |
> | | calls and other sessions being lost. |
> | | |
> | | More details about these issues can be found at |
> | | http://bugs.digium.com/view.php?id=9313. |
> +------------------------------------------------------------------------+
>
> +------------------------------------------------------------------------+
> | Resolution | All users are urged to upgrade to the appropriate version |
> | | of their Asterisk product listed in the 'Corrected In' |
> | | section below. |
> +------------------------------------------------------------------------+
>
> +------------------------------------------------------------------------+
> | Affected Versions |
> |------------------------------------------------------------------------|
> | Product | Release | |
> | | Series | |
> |---------------------------+-------------+------------------------------|
> | Asterisk Open Source | 1.0.x | has not been evaluated as |
> | | | this release series is no |
> | | | longer maintained |
> |---------------------------+-------------+------------------------------|
> | Asterisk Open Source | 1.2.x | all releases prior to 1.2.18 |
> |---------------------------+-------------+------------------------------|
> | Asterisk Open Source | 1.4.x | all releases prior to 1.4.3 |
> |---------------------------+-------------+------------------------------|
> | Asterisk Business Edition | A.x.x | all releases |
> |---------------------------+-------------+------------------------------|
> | Asterisk Business Edition | B.x.x | all releases prior to and |
> | | | including B.1.3.2 |
> |---------------------------+-------------+------------------------------|
> | AsteriskNOW | pre-release | all releases prior to and |
> | | | including Beta 5 |
> |---------------------------+-------------+------------------------------|
> | Asterisk Appliance | 0.x.x | all releases prior to 0.4.0 |
> | Developer Kit | | |
> +------------------------------------------------------------------------+
>
> +------------------------------------------------------------------------+
> | Corrected In |
> |------------------------------------------------------------------------|
> | Product | Release |
> |--------------------+---------------------------------------------------|
> | Asterisk Open | 1.2.18 and 1.4.3, available from |
> | Source | ftp://ftp.digium.com/pub/telephony/asterisk |
> |--------------------+---------------------------------------------------|
> | Asterisk Business | B.1.3.3, available from the Asterisk Business |
> | Edition | Edition user portal on http://www.digium.com or |
> | | via Digium Technical Support |
> |--------------------+---------------------------------------------------|
> | AsteriskNOW | Beta 6, when available from |
> | | http://www.asterisknow.org, Beta 5 users can use |
> | | use 'System Update' in the appliance control |
> | | panel to update their version of AsteriskNOW |
> |--------------------+---------------------------------------------------|
> | Asterisk Appliance | 0.4.0, available from |
> | Developer Kit | ftp://ftp.digium.com/pub/telephony/aadk |
> +------------------------------------------------------------------------+
>
> +------------------------------------------------------------------------+
> | Links | http://bugs.digium.com/view.php?id=9313 |
> +------------------------------------------------------------------------+
>
> +------------------------------------------------------------------------+
> | Asterisk Project Security Advisories are posted at |
> | http://www.asterisk.org/security. |
> | |
> | This document may be superseded by later versions; if so, the latest |
> | version will be posted at |
> | http://www.asterisk.org/files/ASA-2007-011.pdf. |
> +------------------------------------------------------------------------+
>
> Asterisk Project Security Advisory - ASA-2007-011
> Copyright (c) 2007 Digium, Inc. All Rights Reserved.
> Permission is hereby granted to distribute and publish this advisory in its
> original, unaltered form.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

 

TOP