Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:19719
HistoryApr 24, 2008 - 12:00 a.m.

AST-2008-006 - 3-way handshake in IAX2 incomplete

2008-04-2400:00:00
vulners.com
10
           Asterisk Project Security Advisory - AST-2008-006

Β±-----------------------------------------------------------------------+
| Product | Asterisk |
|--------------------Β±--------------------------------------------------|
| Summary | 3-way handshake in IAX2 incomplete |
|--------------------Β±--------------------------------------------------|
| Nature of Advisory | Remote amplification attack |
|--------------------Β±--------------------------------------------------|
| Susceptibility | Remote unauthenticated sessions |
|--------------------Β±--------------------------------------------------|
| Severity | Critical |
|--------------------Β±--------------------------------------------------|
| Exploits Known | Yes |
|--------------------Β±--------------------------------------------------|
| Reported On | April 18, 2008 |
|--------------------Β±--------------------------------------------------|
| Reported By | Joel R. Voss aka. Javantea < jvoss AT altsci DOT |
| | com > |
|--------------------Β±--------------------------------------------------|
| Posted On | April 22, 2008 |
|--------------------Β±--------------------------------------------------|
| Last Updated On | April 22, 2008 |
|--------------------Β±--------------------------------------------------|
| Advisory Contact | Tilghman Lesher < tlesher AT digium DOT com > |
|--------------------Β±--------------------------------------------------|
| CVE Name | CVE-2008-1897 |
Β±-----------------------------------------------------------------------+

Β±-----------------------------------------------------------------------+
| Description | Javantea originally reported an issue in IAX2, whereby |
| | an attacker could send a spoofed IAX2 NEW message, and |
| | Asterisk would start sending early audio to the target |
| | address, without ever receiving an initial response. |
| | That original vulnerability was addressed in June 2007, |
| | by requiring a response to the initial NEW message |
| | before starting to send any audio. |
| | |
| | Javantea subsequently found that we were doing |
| | insufficent verification of the ACK response and that |
| | the ACK response could be spoofed, just like the initial |
| | NEW message. We have addressed this failure with two |
| | changes. First, we have started to require that the ACK |
| | response contains the unique source call number that we |
| | send in our reply to the NEW message. Any ACK response |
| | that does not contain the source call number that we |
| | have created will be silently thrown away. Second, we |
| | have made the generation of our source call number a |
| | little more difficult to predict, by randomly selecting |
| | a source call number, instead of allocating them |
| | sequentially. |
Β±-----------------------------------------------------------------------+

Β±-----------------------------------------------------------------------+
| Workaround | Disable remote unauthenticated IAX2 sessions, by |
| | disallowing guest access. |
Β±-----------------------------------------------------------------------+

Β±-----------------------------------------------------------------------+
| Resolution | Upgrade your Asterisk installation to revision 114561 or |
| | later, or install one of the releases shown below. |
Β±-----------------------------------------------------------------------+

Β±-----------------------------------------------------------------------+
| Commentary | We would like to thank Javantea for notifying us of this |
| | problem; however, we note that he posted exploit code |
| | prior to that notification, which is considered |
| | irresponsible behavior in the whitehat security industry. |
| | In the future, advance notice of any such release would |
| | be appreciated. |
Β±-----------------------------------------------------------------------+

Β±-----------------------------------------------------------------------+

Affected Versions
Product
-------------------------------Β±-----------Β±--------------------------
Asterisk Open Source
-------------------------------Β±-----------Β±--------------------------
Asterisk Open Source
-------------------------------Β±-----------Β±--------------------------
Asterisk Open Source
-------------------------------Β±-----------Β±--------------------------
Asterisk Business Edition
-------------------------------Β±-----------Β±--------------------------
Asterisk Business Edition
-------------------------------Β±-----------Β±--------------------------
Asterisk Business Edition
-------------------------------Β±-----------Β±--------------------------
AsteriskNOW
-------------------------------Β±-----------Β±--------------------------
Asterisk Appliance Developer
Kit
-------------------------------Β±-----------Β±--------------------------
s800i (Asterisk Appliance)
Β±-----------------------------------------------------------------------+

Β±-----------------------------------------------------------------------+

Corrected In
Product
---------------------------------------------Β±-------------------------
Asterisk Open Source
---------------------------------------------Β±-------------------------
Asterisk Open Source
---------------------------------------------Β±-------------------------
Asterisk Business Edition
---------------------------------------------Β±-------------------------
Asterisk Business Edition
---------------------------------------------Β±-------------------------
AsteriskNOW
---------------------------------------------Β±-------------------------
s800i (Asterisk Appliance)
Β±-----------------------------------------------------------------------+

Β±-----------------------------------------------------------------------+
| Links | https://www.altsci.com/concepts/page.php?s=asteri&amp;p=2 |
Β±-----------------------------------------------------------------------+

Β±-----------------------------------------------------------------------+
| Asterisk Project Security Advisories are posted at |
| http://www.asterisk.org/security |
| |
| This document may be superseded by later versions; if so, the latest |
| version will be posted at |
| http://downloads.digium.com/pub/security/AST-2008-006.pdf and |
| http://downloads.digium.com/pub/security/AST-2008-006.html |
Β±-----------------------------------------------------------------------+

Β±-----------------------------------------------------------------------+

Revision History
Date
---------------------Β±---------------------Β±--------------------------
April 22, 2008
Β±-----------------------------------------------------------------------+
           Asterisk Project Security Advisory - AST-2008-006
          Copyright &#40;c&#41; 2008 Digium, Inc. All Rights Reserved.

Permission is hereby granted to distribute and publish this advisory in its
original, unaltered form.