exploit the possibilities

Asterisk Project Security Advisory - AST-2013-005

Asterisk Project Security Advisory - AST-2013-005
Posted Aug 28, 2013
Authored by Matt Jordan | Site asterisk.org

Asterisk Project Security Advisory - A remotely exploitable crash vulnerability exists in the SIP channel driver if an invalid SDP is sent in a SIP request that defines media descriptions before connection information. The handling code incorrectly attempts to reference the socket address information even though that information has not yet been set.

tags | advisory
MD5 | b715f9c2eaad10cad18835c40db97b9c

Asterisk Project Security Advisory - AST-2013-005

Change Mirror Download
               Asterisk Project Security Advisory - AST-2013-005

Product Asterisk
Summary Remote Crash when Invalid SDP is sent in SIP Request
Nature of Advisory Remote Crash
Susceptibility Remote Unauthenticated Sessions
Severity Major
Exploits Known None
Reported On July 03, 2013
Reported By Walter Doekes, OSSO B.V.
Posted On August 27, 2013
Last Updated On August 27, 2013
Advisory Contact Matthew Jordan <mjordan AT digium DOT com>
CVE Name Pending

Description A remotely exploitable crash vulnerability exists in the
SIP channel driver if an invalid SDP is sent in a SIP
request that defines media descriptions before connection
information. The handling code incorrectly attempts to
reference the socket address information even though that
information has not yet been set.

Resolution This patch adds checks when handling the various media
descriptions that ensures the media descriptions are handled
only if we have connection information suitable for that
media.

Thanks to Walter Doekes of OSSO B.V. for finding, reporting,
testing, and providing the fix for this problem.

Affected Versions
Product Release Series
Asterisk Open Source 1.8.x All Versions
Asterisk Open Source 10.x All Versions
Asterisk Open Source 11.x All Versions
Certified Asterisk 1.8.15 All Versions
Certified Asterisk 11.2 All Versions
Asterisk with Digiumphones 10.x-digiumphones All Versions

Corrected In
Product Release
Asterisk Open Source 1.8.23.1, 10.12.3, 11.5.1
Certified Asterisk 1.8.15-cert3, 11.2-cert2
Asterisk with Digiumphones 10.12.3-digiumphones

Patches
SVN URL Revision
http://downloads.asterisk.org/pub/security/AST-2013-005-1.8.diff Asterisk 1.8
http://downloads.asterisk.org/pub/security/AST-2013-005-10.diff Asterisk 10
http://downloads.asterisk.org/pub/security/AST-2013-005-10-digiumphones.diff Asterisk
10-digiumphones
http://downloads.asterisk.org/pub/security/AST-2013-005-11.diff Asterisk 11
http://downloads.asterisk.org/pub/security/AST-2013-005-1.8.15.diff Certified
Asterisk 1.8.15
http://downloads.asterisk.org/pub/security/AST-2013-005-11.2.diff Certified
Asterisk 11.2

Links https://issues.asterisk.org/jira/browse/ASTERISK-22007

Asterisk Project Security Advisories are posted at
http://www.asterisk.org/security

This document may be superseded by later versions; if so, the latest
version will be posted at
http://downloads.digium.com/pub/security/AST-2013-005.pdf and
http://downloads.digium.com/pub/security/AST-2013-005.html

Revision History
Date Editor Revisions Made
2013-08-27 Matt Jordan Initial Revision

Asterisk Project Security Advisory - AST-2013-005
Copyright (c) 2013 Digium, Inc. All Rights Reserved.
Permission is hereby granted to distribute and publish this advisory in its
original, unaltered form.
Login or Register to add favorites

File Archive:

April 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    17 Files
  • 2
    Apr 2nd
    2 Files
  • 3
    Apr 3rd
    2 Files
  • 4
    Apr 4th
    0 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    15 Files
  • 7
    Apr 7th
    20 Files
  • 8
    Apr 8th
    16 Files
  • 9
    Apr 9th
    5 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    4 Files
  • 13
    Apr 13th
    8 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close