what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

sip-fraud.txt

sip-fraud.txt
Posted Nov 5, 2007
Authored by Radu State, Humberto J. Abdelnur, Olivier Festor

SIP digest access authentication relay-attack for toll fraud.

tags | exploit
SHA-256 | ca104a5ef7c3ae9a777acdbf17be3e4db54266bec27c9beeaaf57be66696e2c5

sip-fraud.txt

Change Mirror Download
SIP Digest Access Authentication RELAY-ATTACK for Toll-Fraud



In this post, we would like to inform about a potential Authentication
vulnerability

in SIP, where all SIP equipments using Digest Access Authentication
which can issue

re-INVITEs are vulnerable.



The problem lies in an attack scenario, where a called device can be
triggered by a

calling party to issue a re-INVITE. Such cases appear when either a
phone is put on

hold. More general, this is possible whenever a target refresh within a
dialog takes

place.



The impact is that Toll-fraud, Call-ID spoofing, etc. are possible,
allowing a third

entity to call on behalf of a victim. The victim is accountable in this
case for the

call.



To our knowledge, we don't know if neither the IETF nor anybody else
has addressed

this issue yet.



THIS IN NOT THE KNOWN ISSUE OF MAN IN THE MIDDLE. THE MAIN NOVELTY IS
THAT AN

ATTACKER CAN TRIGGER A re-INVITE FROM A CALLED PHONE AND REQUEST IT TO
AUTHENTICATE.

In the known MITM the attacker has to wait until the victim initiates a
call and the

attacker may issue the call to a destination choice, but to the one
initially chosen

by the victim (RFC 3261 Section 22.4).



Description of the attack:



Synopsis



An attacker will issue a call to the victim, the victim answer and
later on put the

attacker on hold. To address to be put on hold, an accomplice of the
attacker may

initiate another call. Once the attacker receives the re-INVITE
specifying the

"On hold", he/she will request the victim to authenticate. This last
authentication

may be use by the attacker to impersonate the victim at its own proxy.
Detailed

explanation is below.



Notations



P is the proxy located at URL: proxy.org

X is the attacker located at URL: attacker.lan.org

V is the victim located at URL: victim.lan.org

V is also registered with P under the username victim@proxy.org



Y is the accomplice of X (it can be in fact X), but we use another
notation for

clarity sake



Objective:



X wants to call a toll fraud number 1-900-XXXX impersonating V



Process:



Step 1) X calls's directly V.

"The route set MUST be set to the list of URIs in the
Record-Route header

field from the request...The remote target MUST be set to the
URI from

the Contact header field of the request." RFC 3261 Section
12.1.1 UAS

behaviour





X ---------- INVITE victim.lan.org -------------> V

From : attacker@attacker.lan.org

To: victim@victim.lan.org

Contact: 1900-XXXX@proxy.org

Record-Route: attacker.lan.org



Step 2) The normal SIP processing



X <--------------- 180 Ringing ------------------ V

X <----------------- 200 OK --------------------- V



X <--------------- Media Data ------------------> V





Step 3) The accomplice Y steps in and invites victim V, and then the
victim decides

to put X on hold





Step 4) The victim, V, sends a re-INVITE to X (to put it on hold)

"The UAC uses the remote target and route set to build the
Request-URI and

Route header field of the request." RFC 3261 12.2.1.1
Generating the

Request (Requests within a Dialog)



X <----------- INVITE 190XXXX@proxy.org -------- V

From: victim@victim.lan.org

To : attacker@attacker.lan.org



Step 5) X calls 1900-XXXX using the proxy P and the proxies asks X to
authenticate

using a Digest Access Authentication with nonce
="Proxy-Nonce-T1" and

realm ="proxy.org"



Step 6) X request the victim to authenticate the re-INVITE from step 4
using the

same Digest Access Authentication received in step 5



X ------------401/407 Authenticate ------------> V

Digest: realm ="proxy.org", nonce="Proxy-Nonce-T1"



Step 7) In this step the victim will do the work for X (Relay Attack)



X <----------- INVITE 190XXXX@proxy.org -------- V

Digest: realm ="proxy.org", nonce="Proxy-Nonce-T1"

username= "victim",

uri="1900XXXX@proxy.org",

response="the victim computed response"



Step 8) X may reply now to the Proxy with the valid Digest Access
Authentication

computed by the victim. Note that the Digest itself it is a
perfectly

valid one.





POC code:



Available ONLY to legitimate VoIP device manufacturers.



Possible Mitigations:



Avoid re-INVITE

Use strict outbound proxy with a complementary IDS to detect possible
anomalies

...



Further reading:



More details (beyond simple ASCII drawings) can be found on

http://www.loria.fr/~abdelnur



Credits:



Humberto Abdelnur, Ph.D student, the Madynes team at INRIA

Radu State, Ph.D, the Madynes team at INRIA

Olivier Festor, Ph.D the Madynes team at INRIA



This vulnerability was identified by the Madynes research team at INRIA
Lorraine, using

the Madynes VoIP fuzzer KiF~KIPH






No virus found in this outgoing message.
Checked by AVG Free Edition.
Version: 7.5.503 / Virus Database: 269.15.21/1109 - Release Date: 04/11/2007
11:05

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close