what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ipphone-reauth.txt

ipphone-reauth.txt
Posted Oct 22, 2007
Authored by Daniel Stirnimann | Site csnc.ch

The Nortal UNIStim IP Phone signalization protocol is vulnerable against spoofed re-authentication messages.

tags | advisory, spoof, protocol
SHA-256 | ae2a7818f57204ac8d0a23e283013e74226689cf3f793a25d7f4c67a3e4e5699

ipphone-reauth.txt

Change Mirror Download
#############################################################
#
# COMPASS SECURITY ADVISORY http://www.csnc.ch/
#
#############################################################
#
# Product: IP Phone
# Vendor: Nortel
# Subject: IP Phone forced re-authentication
# Risk: High
# Effect: Currently exploitable
# Author: Daniel Stirnimann (daniel.stirnimann (at) csnc (dot) ch)
# Date: October, 18th 2007
#
#############################################################

Introduction:
-------------
The UNIStim signalisation protocol is vulnerable against spoofed re-authentication messages. A malicious user can send spoofed registration messages to the server to which a UNIStim IP phone is connected. This can force the legitimate IP phone into a situation where it must re-register
with the server to maintain service. A continuous stream of these messages prevents the IP phone from properly registering.

Nortel has noted this as:
Title: DoS Potential Vulnerability - UNIStim IP Phone Forced to Re-register
Number: 2007008385
http://support.nortel.com/go/main.jsp?cscat=SECUREADVISORY

Vulnerable:
-----------
Nortel IP Phone 1140E
IP Softphone 2050
and others.

See associated products on the Nortel advisory.

Vulnerability Management:
-------------------------
June 2007: Vulnerability found
June 2007: Nortel Security notified
October 2007: Nortel Advisory & Patches available
October 2007: Compass Security Information

Remediation:
------------
Follow the recommended actions for the affected systems, as identified in the Nortel Advisory.

Technical Description:
----------------------
A malicious user can send a resume message to the signaling server to which an IP phone is connected. The resume message is a UNIStim UDP datagram. In order for the signaling server to detect which IP phone wants to resume the
connection it reads the source IP address from the UDP datagram to identify the client. That means we can send a spoofed resume UNIStim UDP datagram.

The server sends the new sequence number back to the IP phone. However, because we spoofed the above message, we don't see the response. The effect is that, the IP phone is out of sync with the server. During this time, the IP phone can not take on or make any calls. As soon as the IP phone realizes that it is out of sync (watchdog timeout
expired) it will re-authenticate against the signaling server. Note that if the malicious user continues to send spoofed resume messages
the hard phone will not be able to go online.

Reference:
http://www.csnc.ch/static/advisory/secadvisorylist.html
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close