Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:19955
HistoryJun 05, 2008 - 12:00 a.m.

AST-2008-008: Remote Crash Vulnerability in SIP channel driver when run in pedantic mode

2008-06-0500:00:00
vulners.com
6
           Asterisk Project Security Advisory - AST-2008-008

±-----------------------------------------------------------------------+
| Product | Asterisk |
|--------------------±--------------------------------------------------|
| Summary | Remote Crash Vulnerability in SIP channel driver |
| | when run in pedantic mode |
|--------------------±--------------------------------------------------|
| Nature of Advisory | Denial of Service |
|--------------------±--------------------------------------------------|
| Susceptibility | Remote Unauthenticated Sessions |
|--------------------±--------------------------------------------------|
| Severity | Critical |
|--------------------±--------------------------------------------------|
| Exploits Known | No |
|--------------------±--------------------------------------------------|
| Reported On | May 8, 2008 |
|--------------------±--------------------------------------------------|
| Reported By | Hooi Ng (bugs.digium.com user hooi) |
|--------------------±--------------------------------------------------|
| Posted On | May 8, 2008 |
|--------------------±--------------------------------------------------|
| Last Updated On | June 3, 2008 |
|--------------------±--------------------------------------------------|
| Advisory Contact | Joshua Colp <[email protected]> |
|--------------------±--------------------------------------------------|
| CVE Name | CVE-2008-2119 |
±-----------------------------------------------------------------------+

±-----------------------------------------------------------------------+
| Description | During pedantic SIP processing the From header value is |
| | passed to the ast_uri_decode function to be decoded. In |
| | two instances it is possible for the code to cause a |
| | crash as the From header value is not checked to be |
| | non-NULL before being passed to the function. |
±-----------------------------------------------------------------------+

±-----------------------------------------------------------------------+
| Resolution | The From header value is now copied into a buffer before |
| | being passed to the ast_uri_decode function if pedantic |
| | is enabled and in another instance it is checked to be |
| | non-NULL before being passed. |
±-----------------------------------------------------------------------+

±-----------------------------------------------------------------------+

Affected Versions
Product
-------------------------------±-----------±--------------------------
Asterisk Open Source
-------------------------------±-----------±--------------------------
Asterisk Open Source
-------------------------------±-----------±--------------------------
Asterisk Open Source
-------------------------------±-----------±--------------------------
Asterisk Business Edition
-------------------------------±-----------±--------------------------
Asterisk Business Edition
-------------------------------±-----------±--------------------------
Asterisk Business Edition
-------------------------------±-----------±--------------------------
AsteriskNOW
-------------------------------±-----------±--------------------------
Asterisk Appliance Developer
Kit
-------------------------------±-----------±--------------------------
s800i (Asterisk Appliance)
±-----------------------------------------------------------------------+

±-----------------------------------------------------------------------+

Corrected In
Product
---------------±-------------------------------------------------------
Asterisk Open
Source
---------------±-------------------------------------------------------
Asterisk
Business
Edition
±-----------------------------------------------------------------------+

±-----------------------------------------------------------------------+
| Links | http://bugs.digium.com/view.php?id=12607 |
±-----------------------------------------------------------------------+

±-----------------------------------------------------------------------+
| Asterisk Project Security Advisories are posted at |
| http://www.asterisk.org/security |
| |
| This document may be superseded by later versions; if so, the latest |
| version will be posted at |
| http://downloads.digium.com/pub/security/AST-2008-008.pdf and |
| http://downloads.digium.com/pub/security/AST-2008-008.html |
±-----------------------------------------------------------------------+

±-----------------------------------------------------------------------+

Revision History
Date
------------------±-------------------±-------------------------------
2008-06-03
±-----------------------------------------------------------------------+
           Asterisk Project Security Advisory - AST-2008-008
          Copyright &#40;c&#41; 2008 Digium, Inc. All Rights Reserved.

Permission is hereby granted to distribute and publish this advisory in its
original, unaltered form.