Exploit the possiblities

Asterisk Project Security Advisory - AST-2012-009

Asterisk Project Security Advisory - AST-2012-009
Posted Jun 14, 2012
Authored by Matt Jordan, Christoph Hebeisen | Site asterisk.org

Asterisk Project Security Advisory - AST-2012-008 previously dealt with a denial of service attack exploitable in the Skinny channel driver that occurred when certain messages are sent after a previously registered station sends an Off Hook message. Unresolved in that patch is an issue in the Asterisk 10 releases, wherein, if a Station Key Pad Button Message is processed after an Off Hook message, the channel driver will inappropriately dereference a Null pointer. Similar to AST-2012-008, a remote attacker with a valid SCCP ID can can use this vulnerability by closing a connection to the Asterisk server when a station is in the "Off Hook" call state and crash the server.

tags | advisory, remote, denial of service
advisories | CVE-2012-3553
MD5 | 0559bf1eaeb33a2104fd097035bfaeb6

Asterisk Project Security Advisory - AST-2012-009

Change Mirror Download
               Asterisk Project Security Advisory - AST-2012-009

Product Asterisk
Summary Skinny Channel Driver Remote Crash Vulnerability
Nature of Advisory Denial of Service
Susceptibility Remote authenticated sessions
Severity Minor
Exploits Known No
Reported On May 30, 2012
Reported By Christoph Hebeisen, TELUS Security Labs
Posted On June 14, 2012
Last Updated On June 14, 2012
Advisory Contact Matt Jordan < mjordan AT digium DOT com >
CVE Name CVE-2012-3553

Description AST-2012-008 previously dealt with a denial of service
attack exploitable in the Skinny channel driver that
occurred when certain messages are sent after a previously
registered station sends an Off Hook message. Unresolved in
that patch is an issue in the Asterisk 10 releases,
wherein, if a Station Key Pad Button Message is processed
after an Off Hook message, the channel driver will
inappropriately dereference a Null pointer.

Similar to AST-2012-008, a remote attacker with a valid
SCCP ID can can use this vulnerability by closing a
connection to the Asterisk server when a station is in the
"Off Hook" call state and crash the server.

Resolution The presence of a device for a line is now checked in the
appropriate channel callbacks, preventing the crash.

Affected Versions
Product Release Series
Asterisk Open Source 10.x All Versions

Corrected In
Product Release
Asterisk Open Source 10.5.1

Patches
SVN URL Revision
http://downloads.asterisk.org/pub/security/AST-2012-009-10.diff v10

Links https://issues.asterisk.org/jira/browse/ASTERISK-19905

Asterisk Project Security Advisories are posted at
http://www.asterisk.org/security

This document may be superseded by later versions; if so, the latest
version will be posted at
http://downloads.digium.com/pub/security/AST-2012-009.pdf and
http://downloads.digium.com/pub/security/AST-2012-009.html

Revision History
Date Editor Revisions Made
06/14/2012 Matt Jordan Initial Release

Asterisk Project Security Advisory - AST-2012-009
Copyright (c) 2012 Digium, Inc. All Rights Reserved.
Permission is hereby granted to distribute and publish this advisory in its
original, unaltered form.

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

January 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    16 Files
  • 4
    Jan 4th
    39 Files
  • 5
    Jan 5th
    26 Files
  • 6
    Jan 6th
    40 Files
  • 7
    Jan 7th
    2 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    25 Files
  • 10
    Jan 10th
    28 Files
  • 11
    Jan 11th
    44 Files
  • 12
    Jan 12th
    32 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    4 Files
  • 15
    Jan 15th
    31 Files
  • 16
    Jan 16th
    15 Files
  • 17
    Jan 17th
    16 Files
  • 18
    Jan 18th
    24 Files
  • 19
    Jan 19th
    15 Files
  • 20
    Jan 20th
    5 Files
  • 21
    Jan 21st
    1 Files
  • 22
    Jan 22nd
    15 Files
  • 23
    Jan 23rd
    12 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close