---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. ---------------------------------------------------------------------- TITLE: Asterisk Multiple Vulnerabilities SECUNIA ADVISORY ID: SA26099 VERIFY ADVISORY: http://secunia.com/advisories/26099/ CRITICAL: Highly critical IMPACT: DoS, System access WHERE: >From remote SOFTWARE: Asterisk Business Edition 2.x http://secunia.com/product/14820/ Asterisk 1.x http://secunia.com/product/2155/ Asterisk Appliance Developer Kit 0.x http://secunia.com/product/14821/ DESCRIPTION: Some vulnerabilities have been reported in Asterisk, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. 1) A boundary error exists in the Asterisk STUN implementation, which can be exploited to cause the application to crash via specially crafted RTP packets. Successful exploitation requires that the chan_sip, chan_gtalk, chan_jingle, chan_h323, chan_mgcp, or chan_skinny is enabled. The vulnerability is reported in the following products: Asterisk Open Source 1.4.x prior to version 1.4.8 AsteriskNOW pre-release prior to version beta7 Asterisk Appliance Developer Kit prior to version 0.5.0 s800i 1.0.x prior to version 1.0.2. 2) A boundary error exists in the Asterisk Skinny channel driver (chan_skinny), which can be exploited to cause the application to crash via packets that contain a size field smaller than the actual size of the packet. Successful exploitation requires that chan_skinny is enabled. 3) A NULL-pointer dereference error exists in the Asterisk IAX2 channel driver (chan_iax2), which can be exploited to cause a DoS via specially crafted LGRQ and LAGRP frames. Successful exploitation requires that chan_iax is enabled. 4) A boundary error exists in the Asterisk IAX2 channel driver (chan_iax2) within the handling of RTP frames. This can be exploited to cause a stack-based buffer overflow by sending large data payloads (more than 4096 bytes) in a voice or video frame. Successful exploitation of this vulnerability allows execution of arbitrary code, but requires that the system is configured to connect channels that use RTP and IAX channels. Vulnerabilities #2, #3, and #4 are reported in the following products: Asterisk Open Source 1.0.x Asterisk Open Source 1.2.x prior to version 1.2.22 Asterisk Open Source 1.4.x prior to version 1.4.8 AsteriskNOW pre-release prior to version beta7 Asterisk Business Edition A.x.x Asterisk Business Edition B.x.x prior to version B.2.2.1 Asterisk Appliance Developer Kit prior to version 0.5.0 s800i 1.0.x prior to version 1.0.2. SOLUTION: Asterisk Open Source 1.2.x: Update to version 1.2.22. ftp://ftp.digium.com/pub/telephony/asterisk Asterisk Open Source 1.4.x: Update to version 1.4.8. ftp://ftp.digium.com/pub/telephony/asterisk AsteriskNOW pre-release: Update to version beta7. http://www.asterisknow.org Asterisk Business Edition B.x.x: Update to version B.2.2.1. http://www.digium.com Asterisk Appliance Developer Kit: Update to version 0.5.0. ftp://ftp.digium.com/pub/telephony/aadk s800i: Update to version 1.0.2. PROVIDED AND/OR DISCOVERED BY: The vendor credits: 1) and 2) Will Drewry, Google Security Team 3) Chris Clark and Zane Lackey, iSEC Partners 4) Russel Bryant ORIGINAL ADVISORY: 1) http://ftp.digium.com/pub/asa/ASA-2007-017.pdf 2) http://ftp.digium.com/pub/asa/ASA-2007-016.pdf 3) http://ftp.digium.com/pub/asa/ASA-2007-015.pdf 4) http://ftp.digium.com/pub/asa/ASA-2007-014.pdf ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------