what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Asterisk Project Security Advisory - AST-2010-001

Asterisk Project Security Advisory - AST-2010-001
Posted Feb 3, 2010
Authored by David Vossel | Site asterisk.org

Asterisk Project Security Advisory - An attacker attempting to negotiate T.38 over SIP can remotely crash Asterisk by modifying the FaxMaxDatagram field of the SDP to contain either a negative or exceptionally large value. The same crash occurs when the FaxMaxDatagram field is omitted from the SDP as well.

tags | advisory
advisories | CVE-2010-0441
SHA-256 | e389de5a471316312db8c85329ef64fc51d31e57f6900226fbee9f94d1d8b6de

Asterisk Project Security Advisory - AST-2010-001

Change Mirror Download
               Asterisk Project Security Advisory - AST-2010-001

+------------------------------------------------------------------------+
| Product | Asterisk |
|----------------------+-------------------------------------------------|
| Summary | T.38 Remote Crash Vulnerability |
|----------------------+-------------------------------------------------|
| Nature of Advisory | Denial of Service |
|----------------------+-------------------------------------------------|
| Susceptibility | Remote unauthenticated sessions |
|----------------------+-------------------------------------------------|
| Severity | Critical |
|----------------------+-------------------------------------------------|
| Exploits Known | No |
|----------------------+-------------------------------------------------|
| Reported On | 12/03/09 |
|----------------------+-------------------------------------------------|
| Reported By | issues.asterisk.org users bklang and elsto |
|----------------------+-------------------------------------------------|
| Posted On | 02/03/10 |
|----------------------+-------------------------------------------------|
| Last Updated On | February 2, 2010 |
|----------------------+-------------------------------------------------|
| Advisory Contact | David Vossel < dvossel AT digium DOT com > |
|----------------------+-------------------------------------------------|
| CVE Name | CVE-2010-0441 |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Description | An attacker attempting to negotiate T.38 over SIP can |
| | remotely crash Asterisk by modifying the FaxMaxDatagram |
| | field of the SDP to contain either a negative or |
| | exceptionally large value. The same crash occurs when |
| | the FaxMaxDatagram field is omitted from the SDP as |
| | well. |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Resolution | Upgrade to one of the versions of Asterisk listed in the |
| | "Corrected In" section, or apply a patch specified in the |
| | "Patches" section. |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Affected Versions |
|------------------------------------------------------------------------|
| Product | Release Series | |
|----------------------------------+----------------+--------------------|
| Asterisk Open Source | 1.6.x | All versions |
|----------------------------------+----------------+--------------------|
| Asterisk Business Edition | C.3 | All versions |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Corrected In |
|------------------------------------------------------------------------|
| Product | Release |
|------------------------------------------+-----------------------------|
| Asterisk Open Source | 1.6.0.22 |
|------------------------------------------+-----------------------------|
| Asterisk Open Source | 1.6.1.14 |
|------------------------------------------+-----------------------------|
| Asterisk Open Source | 1.6.2.2 |
|------------------------------------------+-----------------------------|
| | C.3.3.2 |
+------------------------------------------------------------------------+

+-------------------------------------------------------------------------+
| Patches |
|-------------------------------------------------------------------------|
| SVN URL |Branch|
|------------------------------------------------------------------+------|
|http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.0.diff|v1.6.0|
|------------------------------------------------------------------+------|
|http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.1.diff|v1.6.1|
|------------------------------------------------------------------+------|
|http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.2.diff|v1.6.2|
+-------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Links | https://issues.asterisk.org/view.php?id=16634 |
| | |
| | https://issues.asterisk.org/view.php?id=16724 |
| | |
| | https://issues.asterisk.org/view.php?id=16517 |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Asterisk Project Security Advisories are posted at |
| http://www.asterisk.org/security |
| |
| This document may be superseded by later versions; if so, the latest |
| version will be posted at |
| http://downloads.digium.com/pub/security/.pdf and |
| http://downloads.digium.com/pub/security/.html |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Revision History |
|------------------------------------------------------------------------|
| Date | Editor | Revisions Made |
|----------------+----------------------+--------------------------------|
| 02/02/10 | David Vossel | Initial release |
+------------------------------------------------------------------------+

Asterisk Project Security Advisory - AST-2010-001
Copyright (c) 2010 Digium, Inc. All Rights Reserved.
Permission is hereby granted to distribute and publish this advisory in its
original, unaltered form.

Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close