Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:17534
HistoryJul 19, 2007 - 12:00 a.m.

ASA-2007-017: Remote Crash Vulnerability in STUN implementation

2007-07-1900:00:00
vulners.com
10
           Asterisk Project Security Advisory - ASA-2007-017

±-----------------------------------------------------------------------+
| Product | Asterisk |
|--------------------±--------------------------------------------------|
| Summary | Remote Crash Vulnerability in STUN implementation |
|--------------------±--------------------------------------------------|
| Nature of Advisory | Denial of Service |
|--------------------±--------------------------------------------------|
| Susceptibility | Remote Unauthenticated Sessions |
|--------------------±--------------------------------------------------|
| Severity | Critical |
|--------------------±--------------------------------------------------|
| Exploits Known | No |
|--------------------±--------------------------------------------------|
| Reported On | July 13, 2007 |
|--------------------±--------------------------------------------------|
| Reported By | Will Drewry, Google Security Team |
|--------------------±--------------------------------------------------|
| Posted On | July 17, 2007 |
|--------------------±--------------------------------------------------|
| Last Updated On | July 17, 2007 |
|--------------------±--------------------------------------------------|
| Advisory Contact | Joshua Colp <[email protected]> |
|--------------------±--------------------------------------------------|
| CVE Name | CVE-2007-3765 |
±-----------------------------------------------------------------------+

±-----------------------------------------------------------------------+
| Description | The Asterisk STUN implementation in the RTP stack has a |
| | remotely exploitable crash vulnerability. A pointer may |
| | run past accessible memory if Asterisk receives a |
| | specially crafted STUN packet on an active RTP port. |
| | |
| | The code that parses the incoming STUN packets |
| | incorrectly checks that the length indicated in the STUN |
| | attribute and the size of the STUN attribute header does |
| | not exceed the available data. This will cause the data |
| | pointer to run past accessible memory and when accessed |
| | will cause a crash. |
±-----------------------------------------------------------------------+

±-----------------------------------------------------------------------+
| Resolution | All users that have chan_sip, chan_gtalk, chan_jingle, |
| | chan_h323, chan_mgcp, or chan_skinny enabled on an |
| | affected version should upgrade to the appropriate |
| | version listed in the correct in section of this |
| | advisory. |
±-----------------------------------------------------------------------+

±-----------------------------------------------------------------------+

Affected Versions
Product
----------------------------------±------------±----------------------
Asterisk Open Source
----------------------------------±------------±----------------------
Asterisk Open Source
----------------------------------±------------±----------------------
Asterisk Open Source
----------------------------------±------------±----------------------
Asterisk Business Edition
----------------------------------±------------±----------------------
Asterisk Business Edition
----------------------------------±------------±----------------------
AsteriskNOW
----------------------------------±------------±----------------------
Asterisk Appliance Developer Kit
----------------------------------±------------±----------------------
s800i (Asterisk Appliance)
±-----------------------------------------------------------------------+

±-----------------------------------------------------------------------+

Corrected In
Product
-----------------±-----------------------------------------------------
Asterisk Open
Source
-----------------±-----------------------------------------------------
AsteriskNOW
-----------------±-----------------------------------------------------
Asterisk
Appliance
Developer Kit
-----------------±-----------------------------------------------------
s800i (Asterisk
Appliance)
±-----------------------------------------------------------------------+

±-----------------------------------------------------------------------+
| Links | |
±-----------------------------------------------------------------------+

±-----------------------------------------------------------------------+
| Asterisk Project Security Advisories are posted at |
| http://www.asterisk.org/security. |
| |
| This document may be superseded by later versions; if so, the latest |
| version will be posted at |
| http://ftp.digium.com/pub/asa/ASA-2007-017.pdf. |
±-----------------------------------------------------------------------+

±-----------------------------------------------------------------------+

Revision History
Date
--------------------±----------------------±--------------------------
July 17, 2006
±-----------------------------------------------------------------------+
           Asterisk Project Security Advisory - ASA-2007-017
          Copyright &#40;c&#41; 2007 Digium, Inc. All Rights Reserved.

Permission is hereby granted to distribute and publish this advisory in its
original, unaltered form.