Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:29920
HistoryOct 09, 2013 - 12:00 a.m.

AST-2013-005: Remote Crash when Invalid SDP is sent in SIP Request

2013-10-0900:00:00
vulners.com
13
           Asterisk Project Security Advisory - AST-2013-005

     Product        Asterisk                                              
     Summary        Remote Crash when Invalid SDP is sent in SIP Request  
Nature of Advisory  Remote Crash                                          
  Susceptibility    Remote Unauthenticated Sessions                       
     Severity       Major                                                 
  Exploits Known    None                                                  
   Reported On      July 03, 2013                                         
   Reported By      Walter Doekes, OSSO B.V.                              
    Posted On       August 27, 2013                                       
 Last Updated On    August 27, 2013                                       
 Advisory Contact   Matthew Jordan <mjordan AT digium DOT com>            
     CVE Name       Pending                                               

Description  A remotely exploitable crash vulnerability exists in the     
             SIP channel driver if an invalid SDP is sent in a SIP        
             request that defines media descriptions before connection    
             information. The handling code incorrectly attempts to       
             reference the socket address information even though that    
             information has not yet been set.                            

Resolution  This patch adds checks when handling the various media        
            descriptions that ensures the media descriptions are handled  
            only if we have connection information suitable for that      
            media.                                                        
                                                                          
            Thanks to Walter Doekes of OSSO B.V. for finding, reporting,  
            testing, and providing the fix for this problem.              

                           Affected Versions
             Product                Release Series    
      Asterisk Open Source               1.8.x        All Versions        
      Asterisk Open Source               10.x         All Versions        
      Asterisk Open Source               11.x         All Versions        
       Certified Asterisk               1.8.15        All Versions        
       Certified Asterisk                11.2         All Versions        
   Asterisk with Digiumphones      10.x-digiumphones  All Versions        

                              Corrected In
              Product                              Release                
        Asterisk Open Source              1.8.23.1, 10.12.3, 11.5.1       
         Certified Asterisk                1.8.15-cert3, 11.2-cert2       
     Asterisk with Digiumphones              10.12.3-digiumphones         

                                      Patches                            
                              SVN URL                                       Revision     

http://downloads.asterisk.org/pub/security/AST-2013-005-1.8.diff Asterisk 1.8
http://downloads.asterisk.org/pub/security/AST-2013-005-10.diff Asterisk 10
http://downloads.asterisk.org/pub/security/AST-2013-005-10-digiumphones.diff Asterisk
10-digiumphones
http://downloads.asterisk.org/pub/security/AST-2013-005-11.diff Asterisk 11
http://downloads.asterisk.org/pub/security/AST-2013-005-1.8.15.diff Certified
Asterisk 1.8.15
http://downloads.asterisk.org/pub/security/AST-2013-005-11.2.diff Certified
Asterisk 11.2

   Links     https://issues.asterisk.org/jira/browse/ASTERISK-22007       

Asterisk Project Security Advisories are posted at                        
http://www.asterisk.org/security                                          
                                                                          
This document may be superseded by later versions; if so, the latest      
version will be posted at                                                 
http://downloads.digium.com/pub/security/AST-2013-005.pdf and             
http://downloads.digium.com/pub/security/AST-2013-005.html                

                            Revision History
      Date                 Editor                  Revisions Made         
2013-08-27         Matt Jordan              Initial Revision              

           Asterisk Project Security Advisory - AST-2013-005
          Copyright (c) 2013 Digium, Inc. All Rights Reserved.

Permission is hereby granted to distribute and publish this advisory in its
original, unaltered form.