what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Asterisk Project Security Advisory - AST-2014-002

Asterisk Project Security Advisory - AST-2014-002
Posted Mar 11, 2014
Authored by Kinsey Moore, Colin Farrell | Site asterisk.org

Asterisk Project Security Advisory - An attacker can use all available file descriptors using SIP INVITE requests, which can result in a denial of service.

tags | advisory, denial of service
advisories | CVE-2014-2287
SHA-256 | 786ba76251ce62da4df7d6eb92f164fe200a08d34d8310287e6d97b9f289d40c

Asterisk Project Security Advisory - AST-2014-002

Change Mirror Download
               Asterisk Project Security Advisory - AST-2014-002

Product Asterisk
Summary Denial of Service Through File Descriptor Exhaustion
with chan_sip Session-Timers
Nature of Advisory Denial of Service
Susceptibility Remote Authenticated or Anonymous Sessions
Severity Moderate
Exploits Known No
Reported On 2014/02/25
Reported By Corey Farrell
Posted On March 10, 2014
Last Updated On March 10, 2014
Advisory Contact Kinsey Moore <kmoore AT digium DOT com>
CVE Name CVE-2014-2287

Description An attacker can use all available file descriptors using
SIP INVITE requests.

Knowledge required to achieve the attack:

* Valid account credentials or anonymous dial in

* A valid extension that can be dialed from the SIP account

Trigger conditions:

* chan_sip configured with "session-timers" set to
"originate" or "accept"

** The INVITE request must contain either a Session-Expires
or a Min-SE header with malformed values or values
disallowed by the system's configuration.

* chan_sip configured with "session-timers" set to "refuse"

** The INVITE request must offer "timer" in the "Supported"
header

Asterisk will respond with code 400, 420, or 422 for
INVITEs meeting this criteria. Each INVITE meeting these
conditions will leak a channel and several file
descriptors. The file descriptors cannot be released
without restarting Asterisk which may allow intrusion
detection systems to be bypassed by sending the requests
slowly.

Resolution Upgrade to a version with the patch integrated or apply the
appropriate patch.

Affected Versions
Product Release Series
Asterisk Open Source 1.8.x All
Asterisk Open Source 11.x All
Asterisk Open Source 12.x All
Certified Asterisk 1.8.15 All
Certified Asterisk 11.6 All

Corrected In
Product Release
Asterisk Open Source 1.8.x 1.8.26.1
Asterisk Open Source 11.x 11.8.1
Asterisk Open Source 12.x 12.1.1
Certified Asterisk 1.8.15 1.8.15-cert5
Certified Asterisk 11.6 11.6-cert2

Patches
SVN URL Revision
http://downloads.asterisk.org/pub/security/AST-2014-002-1.8.diff Asterisk
1.8
http://downloads.asterisk.org/pub/security/AST-2014-002-11.diff Asterisk
11
http://downloads.asterisk.org/pub/security/AST-2014-002-12.diff Asterisk
12
http://downloads.asterisk.org/pub/security/AST-2014-002-11.6.diff Asterisk
11.6
Certified
http://downloads.asterisk.org/pub/security/AST-2014-002-1.8.15.diff Asterisk
1.8.15
Certified

Links https://issues.asterisk.org/jira/browse/ASTERISK-23373

Asterisk Project Security Advisories are posted at
http://www.asterisk.org/security

This document may be superseded by later versions; if so, the latest
version will be posted at
http://downloads.digium.com/pub/security/AST-2014-002.pdf and
http://downloads.digium.com/pub/security/AST-2014-002.html

Revision History
Date Editor Revisions Made
2014/03/04 Kinsey Moore Document Creation
2014/03/06 Kinsey Moore Corrections and Wording Clarification
2014/03/10 Kinsey Moore Added missing patch links

Asterisk Project Security Advisory - AST-2014-002
Copyright (c) 2014 Digium, Inc. All Rights Reserved.
Permission is hereby granted to distribute and publish this advisory in its
original, unaltered form.


Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close