what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

AST-2008-001.txt

AST-2008-001.txt
Posted Jan 2, 2008
Authored by Joshua Colp | Site asterisk.org

Asterisk Project Security Advisory - The handling of the BYE with Also transfer method was broken during the development of Asterisk 1.4. If a transfer attempt is made using this method the system will immediately crash upon handling the BYE message due to trying to copy data into a NULL pointer.

tags | advisory
SHA-256 | 20c92e563a5e81918a24b9db84f689f656287c30c74250a54b4c5f8c1b9ed24d

AST-2008-001.txt

Change Mirror Download
                Asterisk Project Security Advisory - AST-2008-001

+------------------------------------------------------------------------+
| Product | Asterisk |
|---------------------+--------------------------------------------------|
| Summary | Remote Crash Vulnerability in SIP channel driver |
|---------------------+--------------------------------------------------|
| Nature of Advisory | Denial of Service |
|---------------------+--------------------------------------------------|
| Susceptibility | Remote Unauthenticated Sessions |
|---------------------+--------------------------------------------------|
| Severity | Critical |
|---------------------+--------------------------------------------------|
| Exploits Known | No |
|---------------------+--------------------------------------------------|
| Reported On | December 26, 2007 |
|---------------------+--------------------------------------------------|
| Reported By | Grey VoIP (bugs.digium.com user greyvoip) |
|---------------------+--------------------------------------------------|
| Posted On | January 2, 2008 |
|---------------------+--------------------------------------------------|
| Last Updated On | January 2, 2008 |
|---------------------+--------------------------------------------------|
| Advisory Contact | Joshua Colp <jcolp@digium.com> |
|---------------------+--------------------------------------------------|
| CVE Name | |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Description | The handling of the BYE with Also transfer method was |
| | broken during the development of Asterisk 1.4. If a |
| | transfer attempt is made using this method the system |
| | will immediately crash upon handling the BYE message due |
| | to trying to copy data into a NULL pointer. It is |
| | important to note that a dialog must have already been |
| | established and up in order for this to happen. |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Resolution | A fix has been added so that the BYE with Also transfer |
| | method now properly allocates and uses the transfer data |
| | structure. It will no longer try to copy data into a NULL |
| | pointer and will operate properly. |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Affected Versions |
|------------------------------------------------------------------------|
| Product | Release | |
| | Series | |
|----------------------------+-------------+-----------------------------|
| Asterisk Open Source | 1.0.x | Unaffected |
|----------------------------+-------------+-----------------------------|
| Asterisk Open Source | 1.2.x | Unaffected |
|----------------------------+-------------+-----------------------------|
| Asterisk Open Source | 1.4.x | All versions prior to |
| | | 1.4.17 |
|----------------------------+-------------+-----------------------------|
| Asterisk Business Edition | A.x.x | Unaffected |
|----------------------------+-------------+-----------------------------|
| Asterisk Business Edition | B.x.x | Unaffected |
|----------------------------+-------------+-----------------------------|
| Asterisk Business Edition | C.x.x | All versions prior to |
| | | C.1.0-beta8 |
|----------------------------+-------------+-----------------------------|
| AsteriskNOW | pre-release | All versions prior to beta7 |
|----------------------------+-------------+-----------------------------|
| Asterisk Appliance | SVN | All versions prior to |
| Developer Kit | | Asterisk 1.4 revision 95946 |
|----------------------------+-------------+-----------------------------|
| s800i (Asterisk Appliance) | 1.0.x | All versions prior to |
| | | 1.0.3.4 |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Corrected In |
|------------------------------------------------------------------------|
| Product | Release |
|---------------+--------------------------------------------------------|
| Asterisk Open | 1.4.17, available from |
| Source | http://downloads.digium.com/pub/telephony/asterisk |
|---------------+--------------------------------------------------------|
| Asterisk | C.1.0 |
| Business | |
| Edition | |
|---------------+--------------------------------------------------------|
| AsteriskNOW | Beta7, available from http://www.asterisknow.org/. |
| | |
| | Beta5 and Beta6 users can update using the system |
| | update feature in the appliance control panel. |
|---------------+--------------------------------------------------------|
| Asterisk | Asterisk 1.4 revision 95946. Available by performing |
| Appliance | an svn update of the AADK tree. |
| Developer Kit | |
|---------------+--------------------------------------------------------|
| s800i | 1.0.3.4 |
| (Asterisk | |
| Appliance) | |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Links | http://bugs.digium.com/view.php?id=11637 |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Asterisk Project Security Advisories are posted at |
| http://www.asterisk.org/security |
| |
| This document may be superseded by later versions; if so, the latest |
| version will be posted at |
| http://downloads.digium.com/pub/security/AST-2008-001.pdf and |
| http://downloads.digium.com/pub/security/AST-2008-001.html |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Revision History |
|------------------------------------------------------------------------|
| Date | Editor | Revisions Made |
|------------------+--------------------+--------------------------------|
| 2008-01-02 | Joshua Colp | Initial Release |
+------------------------------------------------------------------------+

Asterisk Project Security Advisory - AST-2008-001
Copyright (c) 2007 Digium, Inc. All Rights Reserved.
Permission is hereby granted to distribute and publish this advisory in its
original, unaltered form.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close