what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

AST-2008-003.txt

AST-2008-003.txt
Posted Mar 19, 2008
Authored by Jason Parker | Site asterisk.org

Asterisk Project Security Advisory - Unauthenticated calls can be made via the SIP channel driver using an invalid From header. This acts similarly to the SIP configuration option 'allowguest=yes', in that calls with a specially crafted From header would be sent to the PBX in the context specified in the general section of sip.conf.

tags | advisory
advisories | CVE-2008-1332
SHA-256 | 81843cf8445447d86cc4da5431fb5f1967c5dbd9adf9c537d45cdf64851f983b

AST-2008-003.txt

Change Mirror Download
               Asterisk Project Security Advisory - AST-2008-003

+------------------------------------------------------------------------+
| Product | Asterisk |
|--------------------+---------------------------------------------------|
| Summary | Unauthenticated calls allowed from SIP channel |
| | driver |
|--------------------+---------------------------------------------------|
| Nature of Advisory | Authentication Bypass |
|--------------------+---------------------------------------------------|
| Susceptibility | Remote Unauthenticated Sessions |
|--------------------+---------------------------------------------------|
| Severity | Major |
|--------------------+---------------------------------------------------|
| Exploits Known | No |
|--------------------+---------------------------------------------------|
| Reported On | March 12, 2008 |
|--------------------+---------------------------------------------------|
| Reported By | Jason Parker <jparker@digium.com> |
|--------------------+---------------------------------------------------|
| Posted On | March 18, 2008 |
|--------------------+---------------------------------------------------|
| Last Updated On | March 18, 2008 |
|--------------------+---------------------------------------------------|
| Advisory Contact | Jason Parker <jparker@digium.com> |
|--------------------+---------------------------------------------------|
| CVE Name | CVE-2008-1332 |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Description | Unauthenticated calls can be made via the SIP channel |
| | driver using an invalid From header. This acts similarly |
| | to the SIP configuration option 'allowguest=yes', in |
| | that calls with a specially crafted From header would be |
| | sent to the PBX in the context specified in the general |
| | section of sip.conf. |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Resolution | A fix has been added which checks for the option |
| | 'allowguest' to be enabled before determining that |
| | authentication is not required. |
| | |
| | As a workaround, modify the context in the general |
| | section of sip.conf to point to a non-trusted location |
| | (example: a non-existent context, or a context that does |
| | nothing but hang up the call). |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Affected Versions |
|------------------------------------------------------------------------|
| Product | Release | |
| | Series | |
|------------------------------+---------+-------------------------------|
| Asterisk Open Source | 1.0.x | All versions |
|------------------------------+---------+-------------------------------|
| Asterisk Open Source | 1.2.x | All versions prior to 1.2.27 |
|------------------------------+---------+-------------------------------|
| Asterisk Open Source | 1.4.x | All versions prior to |
| | | 1.4.18.1 and 1.4.19-rc3 |
|------------------------------+---------+-------------------------------|
| Asterisk Business Edition | A.x.x | All versions |
|------------------------------+---------+-------------------------------|
| Asterisk Business Edition | B.x.x | All versions prior to B.2.5.1 |
|------------------------------+---------+-------------------------------|
| Asterisk Business Edition | C.x.x | All versions prior to C.1.6.2 |
|------------------------------+---------+-------------------------------|
| AsteriskNOW | 1.0.x | All versions prior to 1.0.2 |
|------------------------------+---------+-------------------------------|
| Asterisk Appliance Developer | SVN | All versions prior to |
| Kit | | Asterisk 1.4 revision 109393 |
|------------------------------+---------+-------------------------------|
| s800i (Asterisk Appliance) | 1.0.x | All versions prior to 1.1.0.2 |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Corrected In |
|------------------------------------------------------------------------|
| Product | Release |
|---------------+--------------------------------------------------------|
| Asterisk Open | 1.2.27, 1.4.18.1/1.4.19-rc3, available from |
| Source | http://downloads.digium.com/pub/telephony/asterisk |
|---------------+--------------------------------------------------------|
| Asterisk | B.2.5.1, C.1.6.2 |
| Business | |
| Edition | |
|---------------+--------------------------------------------------------|
| AsteriskNOW | 1.0.2, available from http://www.asterisknow.org/ |
| | |
| | Current users can update using the system update |
| | feature in the appliance control panel. |
|---------------+--------------------------------------------------------|
| Asterisk | Asterisk 1.4 revision 109393. Available by performing |
| Appliance | an svn update of the AADK tree. |
| Developer Kit | |
|---------------+--------------------------------------------------------|
| s800i | 1.1.0.2 |
| (Asterisk | |
| Appliance) | |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Links | |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Asterisk Project Security Advisories are posted at |
| http://www.asterisk.org/security |
| |
| This document may be superseded by later versions; if so, the latest |
| version will be posted at |
| http://downloads.digium.com/pub/security/AST-2008-003.pdf and |
| http://downloads.digium.com/pub/security/AST-2008-003.html |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Revision History |
|------------------------------------------------------------------------|
| Date | Editor | Revisions Made |
|------------------+---------------------+-------------------------------|
| 2008-03-18 | Jason Parker | Initial Release |
+------------------------------------------------------------------------+

Asterisk Project Security Advisory - AST-2008-003
Copyright (c) 2008 Digium, Inc. All Rights Reserved.
Permission is hereby granted to distribute and publish this advisory in its
original, unaltered form.

Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close