accept no compromises

Asterisk Project Security Advisory - AST-2012-009

Asterisk Project Security Advisory - AST-2012-009
Posted Jun 14, 2012
Authored by Matt Jordan, Christoph Hebeisen | Site asterisk.org

Asterisk Project Security Advisory - AST-2012-008 previously dealt with a denial of service attack exploitable in the Skinny channel driver that occurred when certain messages are sent after a previously registered station sends an Off Hook message. Unresolved in that patch is an issue in the Asterisk 10 releases, wherein, if a Station Key Pad Button Message is processed after an Off Hook message, the channel driver will inappropriately dereference a Null pointer. Similar to AST-2012-008, a remote attacker with a valid SCCP ID can can use this vulnerability by closing a connection to the Asterisk server when a station is in the "Off Hook" call state and crash the server.

tags | advisory, remote, denial of service
advisories | CVE-2012-3553
MD5 | 0559bf1eaeb33a2104fd097035bfaeb6

Asterisk Project Security Advisory - AST-2012-009

Change Mirror Download
               Asterisk Project Security Advisory - AST-2012-009

Product Asterisk
Summary Skinny Channel Driver Remote Crash Vulnerability
Nature of Advisory Denial of Service
Susceptibility Remote authenticated sessions
Severity Minor
Exploits Known No
Reported On May 30, 2012
Reported By Christoph Hebeisen, TELUS Security Labs
Posted On June 14, 2012
Last Updated On June 14, 2012
Advisory Contact Matt Jordan < mjordan AT digium DOT com >
CVE Name CVE-2012-3553

Description AST-2012-008 previously dealt with a denial of service
attack exploitable in the Skinny channel driver that
occurred when certain messages are sent after a previously
registered station sends an Off Hook message. Unresolved in
that patch is an issue in the Asterisk 10 releases,
wherein, if a Station Key Pad Button Message is processed
after an Off Hook message, the channel driver will
inappropriately dereference a Null pointer.

Similar to AST-2012-008, a remote attacker with a valid
SCCP ID can can use this vulnerability by closing a
connection to the Asterisk server when a station is in the
"Off Hook" call state and crash the server.

Resolution The presence of a device for a line is now checked in the
appropriate channel callbacks, preventing the crash.

Affected Versions
Product Release Series
Asterisk Open Source 10.x All Versions

Corrected In
Product Release
Asterisk Open Source 10.5.1

Patches
SVN URL Revision
http://downloads.asterisk.org/pub/security/AST-2012-009-10.diff v10

Links https://issues.asterisk.org/jira/browse/ASTERISK-19905

Asterisk Project Security Advisories are posted at
http://www.asterisk.org/security

This document may be superseded by later versions; if so, the latest
version will be posted at
http://downloads.digium.com/pub/security/AST-2012-009.pdf and
http://downloads.digium.com/pub/security/AST-2012-009.html

Revision History
Date Editor Revisions Made
06/14/2012 Matt Jordan Initial Release

Asterisk Project Security Advisory - AST-2012-009
Copyright (c) 2012 Digium, Inc. All Rights Reserved.
Permission is hereby granted to distribute and publish this advisory in its
original, unaltered form.

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

October 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    15 Files
  • 2
    Oct 2nd
    16 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    11 Files
  • 6
    Oct 6th
    6 Files
  • 7
    Oct 7th
    2 Files
  • 8
    Oct 8th
    1 Files
  • 9
    Oct 9th
    13 Files
  • 10
    Oct 10th
    16 Files
  • 11
    Oct 11th
    15 Files
  • 12
    Oct 12th
    23 Files
  • 13
    Oct 13th
    13 Files
  • 14
    Oct 14th
    12 Files
  • 15
    Oct 15th
    2 Files
  • 16
    Oct 16th
    16 Files
  • 17
    Oct 17th
    16 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close