what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

AST-2008-011.txt

AST-2008-011.txt
Posted Jul 23, 2008
Authored by Tilghman Lesher | Site asterisk.org

Asterisk Project Security Advisory - An attacker may request an Asterisk server to send part of a firmware image. However, as this firmware download protocol does not initiate a handshake, the source address may be spoofed. Therefore, an IAX2 FWDOWNL request for a firmware file may consume as little as 40 bytes, yet produces a 1040 byte response. Coupled with multiple geographically diverse Asterisk servers, an attacker may flood an victim site with unwanted firmware packets.

tags | advisory, spoof, protocol
advisories | CVE-2008-3264
SHA-256 | 033fd05fff387ab0474d5a49f0a057699dcb0943d8893658905cf254d19d1aa2

AST-2008-011.txt

Change Mirror Download
               Asterisk Project Security Advisory - AST-2008-011

+------------------------------------------------------------------------+
| Product | Asterisk |
|--------------------+---------------------------------------------------|
| Summary | Traffic amplification in IAX2 firmware |
| | provisioning system |
|--------------------+---------------------------------------------------|
| Nature of Advisory | Traffic amplification attack |
|--------------------+---------------------------------------------------|
| Susceptibility | Remote unauthenticated sessions |
|--------------------+---------------------------------------------------|
| Severity | Critical |
|--------------------+---------------------------------------------------|
| Exploits Known | No |
|--------------------+---------------------------------------------------|
| Reported On | July 18, 2008 |
|--------------------+---------------------------------------------------|
| Reported By | Tilghman Lesher < tlesher AT digium DOT com > |
|--------------------+---------------------------------------------------|
| Posted On | July 22, 2008 |
|--------------------+---------------------------------------------------|
| Last Updated On | July 22, 2008 |
|--------------------+---------------------------------------------------|
| Advisory Contact | Tilghman Lesher < tlesher AT digium DOT com > |
|--------------------+---------------------------------------------------|
| CVE Name | CVE-2008-3264 |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Description | An attacker may request an Asterisk server to send part |
| | of a firmware image. However, as this firmware download |
| | protocol does not initiate a handshake, the source |
| | address may be spoofed. Therefore, an IAX2 FWDOWNL |
| | request for a firmware file may consume as little as 40 |
| | bytes, yet produces a 1040 byte response. Coupled with |
| | multiple geographically diverse Asterisk servers, an |
| | attacker may flood an victim site with unwanted firmware |
| | packets. |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Workaround | The only device which used this firmware upgrade |
| | procedure was the IAXy ATA device, and the last firmware |
| | upgrade was more than 18 months ago. It is unlikely that |
| | any IAXy devices in use today still need the last |
| | firmware upgrade. Therefore, deleting the firmware image |
| | from the directory where it is served from and sending a |
| | reload event to the Asterisk server is sufficient to |
| | purge the firmware image from the Asterisk server's |
| | memory. An Asterisk server which is unable to serve out |
| | the requested firmware image will reply to any such |
| | request with a much smaller REJECT packet, which is |
| | smaller than even the FWDOWNL packet. |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Resolution | This firmware download procedure has been disabled by |
| | default in Asterisk. If you should still need to upgrade |
| | IAXys in the field, there is an option 'allowfwdownload' |
| | which can be enabled. However, due to the reasons |
| | specified on the Workaround section, it is recommended |
| | that you leave this option disabled and enable it only on |
| | secure internal networks when an IAXy is initially |
| | provisioned. |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Affected Versions |
|------------------------------------------------------------------------|
| Product | Release | |
| | Series | |
|----------------------------------+-------------+-----------------------|
| Asterisk Open Source | 1.0.x | All versions |
|----------------------------------+-------------+-----------------------|
| Asterisk Open Source | 1.2.x | All versions prior to |
| | | 1.2.30 |
|----------------------------------+-------------+-----------------------|
| Asterisk Open Source | 1.4.x | All versions prior to |
| | | 1.4.21.2 |
|----------------------------------+-------------+-----------------------|
| Asterisk Addons | 1.2.x | Not affected |
|----------------------------------+-------------+-----------------------|
| Asterisk Addons | 1.4.x | Not affected |
|----------------------------------+-------------+-----------------------|
| Asterisk Business Edition | A.x.x | All versions |
|----------------------------------+-------------+-----------------------|
| Asterisk Business Edition | B.x.x | All versions prior to |
| | | B.2.5.4 |
|----------------------------------+-------------+-----------------------|
| Asterisk Business Edition | C.x.x | All versions prior to |
| | | C.1.10.3 |
|----------------------------------+-------------+-----------------------|
| AsteriskNOW | pre-release | All versions |
|----------------------------------+-------------+-----------------------|
| Asterisk Appliance Developer Kit | 0.x.x | All versions |
|----------------------------------+-------------+-----------------------|
| s800i (Asterisk Appliance) | 1.0.x | All versions prior to |
| | | 1.2.0.1 |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Corrected In |
|------------------------------------------------------------------------|
| Product | Release |
|---------------------------------------------+--------------------------|
| Asterisk Open Source | 1.2.30 |
|---------------------------------------------+--------------------------|
| Asterisk Open Source | 1.4.21.2 |
|---------------------------------------------+--------------------------|
| Asterisk Business Edition | B.2.5.4 |
|---------------------------------------------+--------------------------|
| Asterisk Business Edition | C.1.10.3 |
|---------------------------------------------+--------------------------|
| Asterisk Business Edition | C.2.0.3 |
|---------------------------------------------+--------------------------|
| s800i (Asterisk Appliance) | 1.2.0.1 |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Links | |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Asterisk Project Security Advisories are posted at |
| http://www.asterisk.org/security |
| |
| This document may be superseded by later versions; if so, the latest |
| version will be posted at |
| http://downloads.digium.com/pub/security/AST-2008-011.pdf and |
| http://downloads.digium.com/pub/security/AST-2008-011.html |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Revision History |
|------------------------------------------------------------------------|
| Date | Editor | Revisions Made |
|-----------------+--------------------+---------------------------------|
| July 22, 2008 | Tilghman Lesher | Initial release |
|-----------------+--------------------+---------------------------------|
| July 22, 2008 | Tilghman Lesher | Revised C.1 version numbers |
+------------------------------------------------------------------------+

Asterisk Project Security Advisory - AST-2008-011
Copyright (c) 2008 Digium, Inc. All Rights Reserved.
Permission is hereby granted to distribute and publish this advisory in its
original, unaltered form.
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close