SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (VoIP)  >   Asterisk Vendors:   Digium (Linux Support Services)
Asterisk T.38 Processing Flaw Lets Remote Users Deny Service
SecurityTracker Alert ID:  1023532
SecurityTracker URL:  http://securitytracker.com/id/1023532
CVE Reference:   CVE-2010-0441   (Links to External Site)
Date:  Feb 3 2010
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.6.x
Description:   A vulnerability was reported in Asterisk. A remote user can cause denial of service conditions.

A remote user can send a specially crafted FaxMaxDatagram value in a T.38 protocol message via SIP to cause the target service to crash.

bklang and elsto at issues.asterisk.org reported this vulnerability.

Impact:   A remote user can cause Asterisk to crash.
Solution:   The vendor has issued a fix (1.6.0.22, 1.6.1.14, 1.6.2.2).

The vendor's advisory is available at:

http://downloads.asterisk.org/pub/security/AST-2010-001.html

Vendor URL:  downloads.asterisk.org/pub/security/AST-2010-001.html (Links to External Site)
Cause:   Input validation error
Underlying OS:   Linux (Any), UNIX (Any)

Message History:   None.


 Source Message Contents

Date:  Tue, 02 Feb 2010 16:40:17 -0600
Subject:  [Full-disclosure] AST-2010-001: T.38 Remote Crash Vulnerability

               Asterisk Project Security Advisory - AST-2010-001

   +------------------------------------------------------------------------+
   |       Product        | Asterisk                                        |
   |----------------------+-------------------------------------------------|
   |       Summary        | T.38 Remote Crash Vulnerability                 |
   |----------------------+-------------------------------------------------|
   |  Nature of Advisory  | Denial of Service                               |
   |----------------------+-------------------------------------------------|
   |    Susceptibility    | Remote unauthenticated sessions                 |
   |----------------------+-------------------------------------------------|
   |       Severity       | Critical                                        |
   |----------------------+-------------------------------------------------|
   |    Exploits Known    | No                                              |
   |----------------------+-------------------------------------------------|
   |     Reported On      | 12/03/09                                        |
   |----------------------+-------------------------------------------------|
   |     Reported By      | issues.asterisk.org users bklang and elsto      |
   |----------------------+-------------------------------------------------|
   |      Posted On       | 02/03/10                                        |
   |----------------------+-------------------------------------------------|
   |   Last Updated On    | February 2, 2010                                |
   |----------------------+-------------------------------------------------|
   |   Advisory Contact   | David Vossel < dvossel AT digium DOT com >      |
   |----------------------+-------------------------------------------------|
   |       CVE Name       | CVE-2010-0441                                   |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   | Description | An attacker attempting to negotiate T.38 over SIP can    |
   |             | remotely crash Asterisk by modifying the FaxMaxDatagram  |
   |             | field of the SDP to contain either a negative or         |
   |             | exceptionally large value. The same crash occurs when    |
   |             | the FaxMaxDatagram field is omitted from the SDP as      |
   |             | well.                                                    |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   | Resolution | Upgrade to one of the versions of Asterisk listed in the  |
   |            | "Corrected In" section, or apply a patch specified in the |
   |            | "Patches" section.                                        |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   |                           Affected Versions                            |
   |------------------------------------------------------------------------|
   |             Product              | Release Series |                    |
   |----------------------------------+----------------+--------------------|
   |       Asterisk Open Source       |     1.6.x      | All versions       |
   |----------------------------------+----------------+--------------------|
   |    Asterisk Business Edition     |      C.3       | All versions       |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   |                              Corrected In                              |
   |------------------------------------------------------------------------|
   |                 Product                  |           Release           |
   |------------------------------------------+-----------------------------|
   |           Asterisk Open Source           |          1.6.0.22           |
   |------------------------------------------+-----------------------------|
   |           Asterisk Open Source           |          1.6.1.14           |
   |------------------------------------------+-----------------------------|
   |           Asterisk Open Source           |           1.6.2.2           |
   |------------------------------------------+-----------------------------|
   |                                          |           C.3.3.2           |
   +------------------------------------------------------------------------+

   +-------------------------------------------------------------------------+
   |                                 Patches                                 |
   |-------------------------------------------------------------------------|
   |                             SVN URL                              |Branch|
   |------------------------------------------------------------------+------|
   |http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.0.diff|v1.6.0|
   |------------------------------------------------------------------+------|
   |http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.1.diff|v1.6.1|
   |------------------------------------------------------------------+------|
   |http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.2.diff|v1.6.2|
   +-------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   |     Links      | https://issues.asterisk.org/view.php?id=16634         |
   |                |                                                       |
   |                | https://issues.asterisk.org/view.php?id=16724         |
   |                |                                                       |
   |                | https://issues.asterisk.org/view.php?id=16517         |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   | Asterisk Project Security Advisories are posted at                     |
   | http://www.asterisk.org/security                                       |
   |                                                                        |
   | This document may be superseded by later versions; if so, the latest   |
   | version will be posted at                                              |
   | http://downloads.digium.com/pub/security/.pdf and                      |
   | http://downloads.digium.com/pub/security/.html                         |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   |                            Revision History                            |
   |------------------------------------------------------------------------|
   |      Date      |        Editor        |         Revisions Made         |
   |----------------+----------------------+--------------------------------|
   | 02/02/10       | David Vossel         | Initial release                |
   +------------------------------------------------------------------------+

               Asterisk Project Security Advisory - AST-2010-001
              Copyright (c) 2010 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC