Asterisk Project Security Advisory - AST-2008-008
±-----------------------------------------------------------------------+
| Product | Asterisk |
|--------------------±--------------------------------------------------|
| Summary | Remote Crash Vulnerability in SIP channel driver |
| | when run in pedantic mode |
|--------------------±--------------------------------------------------|
| Nature of Advisory | Denial of Service |
|--------------------±--------------------------------------------------|
| Susceptibility | Remote Unauthenticated Sessions |
|--------------------±--------------------------------------------------|
| Severity | Critical |
|--------------------±--------------------------------------------------|
| Exploits Known | No |
|--------------------±--------------------------------------------------|
| Reported On | May 8, 2008 |
|--------------------±--------------------------------------------------|
| Reported By | Hooi Ng (bugs.digium.com user hooi) |
|--------------------±--------------------------------------------------|
| Posted On | May 8, 2008 |
|--------------------±--------------------------------------------------|
| Last Updated On | June 3, 2008 |
|--------------------±--------------------------------------------------|
| Advisory Contact | Joshua Colp <[email protected]> |
|--------------------±--------------------------------------------------|
| CVE Name | CVE-2008-2119 |
±-----------------------------------------------------------------------+
±-----------------------------------------------------------------------+
| Description | During pedantic SIP processing the From header value is |
| | passed to the ast_uri_decode function to be decoded. In |
| | two instances it is possible for the code to cause a |
| | crash as the From header value is not checked to be |
| | non-NULL before being passed to the function. |
±-----------------------------------------------------------------------+
±-----------------------------------------------------------------------+
| Resolution | The From header value is now copied into a buffer before |
| | being passed to the ast_uri_decode function if pedantic |
| | is enabled and in another instance it is checked to be |
| | non-NULL before being passed. |
±-----------------------------------------------------------------------+
±-----------------------------------------------------------------------+
Affected Versions |
---|
Product |
-------------------------------±-----------±-------------------------- |
Asterisk Open Source |
-------------------------------±-----------±-------------------------- |
Asterisk Open Source |
-------------------------------±-----------±-------------------------- |
Asterisk Open Source |
-------------------------------±-----------±-------------------------- |
Asterisk Business Edition |
-------------------------------±-----------±-------------------------- |
Asterisk Business Edition |
-------------------------------±-----------±-------------------------- |
Asterisk Business Edition |
-------------------------------±-----------±-------------------------- |
AsteriskNOW |
-------------------------------±-----------±-------------------------- |
Asterisk Appliance Developer |
Kit |
-------------------------------±-----------±-------------------------- |
s800i (Asterisk Appliance) |
±-----------------------------------------------------------------------+ |
±-----------------------------------------------------------------------+
Corrected In |
---|
Product |
---------------±------------------------------------------------------- |
Asterisk Open |
Source |
---------------±------------------------------------------------------- |
Asterisk |
Business |
Edition |
±-----------------------------------------------------------------------+ |
±-----------------------------------------------------------------------+
| Links | http://bugs.digium.com/view.php?id=12607 |
±-----------------------------------------------------------------------+
±-----------------------------------------------------------------------+
| Asterisk Project Security Advisories are posted at |
| http://www.asterisk.org/security |
| |
| This document may be superseded by later versions; if so, the latest |
| version will be posted at |
| http://downloads.digium.com/pub/security/AST-2008-008.pdf and |
| http://downloads.digium.com/pub/security/AST-2008-008.html |
±-----------------------------------------------------------------------+
±-----------------------------------------------------------------------+
Revision History |
---|
Date |
------------------±-------------------±------------------------------- |
2008-06-03 |
±-----------------------------------------------------------------------+ |
Asterisk Project Security Advisory - AST-2008-008
Copyright (c) 2008 Digium, Inc. All Rights Reserved.
Permission is hereby granted to distribute and publish this advisory in its
original, unaltered form.