what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

MU Security Advisory 2009-08.01

MU Security Advisory 2009-08.01
Posted Aug 13, 2009
Authored by MU Dynamics, Mu Security research team | Site labs.musecurity.com

The Mu Dynamics Research team has found several vulnerabilities stemming from unsafe use of the sscanf C standard library function. Asterisk versions 1.6.1 through 1.6.1.2 are affected.

tags | advisory, vulnerability
SHA-256 | 4b4ca564af6eb635dec77a8869f1db6582e448ddc90620d17fb84789c0b6f227

MU Security Advisory 2009-08.01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Multiple sscanf vulnerabilities in Asterisk [MU-200908-01]
August 10, 2009

https://labs.mudynamics.com/advisories.html

Affected Products/Versions:
Asterisk 1.6.1 branch up to 1.6.1.2.


Product Overview:

Asterisk is an open source telephony engine and toolkit. Asterisk
implements the Session Initiation Protocol (SIP).


Vulnerability Details:

The Mu Dynamics Research team has found several vulnerabilities
stemming from unsafe use of the sscanf C standard library function.

The sscanf function is used in several places in Asterisk source code
for parsing numeric values from ASCII text in incoming SIP messages.
These
calls to sscanf generally fail to specify a maximum width for the
field being
parsed. With no width specified, sscanf defaults to a maximum width of
infinity. A remote attacker can take advantage of this by crafting a
SIP Invite
message with a large number of ASCII decimal characters in a position
where
a numeric value is being parsed.

E.g. the following sscanf call used to parse out the CSeq value from
the SIP
header is vulnerable (chan_sip.c, line 19578):

if (!error && sscanf(cseq, "%d%n", &seqno, &len) != 1) {

A remote attacker can crash Asterisk by sending a SIP Invite where the
CSeq
value is prefixed by a large number of ASCII decimal characters (such as
32768 zeros).

Other areas demonstrated to be vulnerable include Content-Length parsing
(chan_sip.c, line 6769) and SDP processing (chan_sip.c, lines 6977,
7035,
7043, and 7285). Based on code inspection this list is not complete.


Vendor Response / Solution:

Fixed in Asterisk 1.6.1.4. For details see:
https://downloads.asterisk.org/pub/security/AST-2009-005.html.


History:

July 28, 2009 - First contact with vendor
August 10, 2009 - Vendor releases fix and advisory


See also:
https://www.pcapr.net/advisories/MU-200908-01.pcap
https://downloads.asterisk.org/pub/security/AST-2009-005.pdf


Credit:

This vulnerability was discovered by the Mu Dynamics research team.

https://labs.mudynamics.com/pgpkey.txt

Mu Dynamics proactively eliminates the high cost of service,
application and
network downtime. Mu's solution automates a systematic and repeatable
process
that identifies hard-to-detect sources of potential downtime within IP
services,
applications, and underlying networks. The award-winning Mu solution
is deployed
at more than 100 locations, primarily at leading global service
providers, cable
operators and network product vendors. Headquartered in Sunnyvale,
California,
Mu is backed by leading venture capital firms that include Accel
Partners,
Benchmark Capital, DAG Ventures and Focus Ventures. For more
information, visit
the company's website at https://www.mudynamics.com.



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (Darwin)

iEYEARECAAYFAkqA+oUACgkQR65hS3LuY3LGkwCfa8jXWUvoPFQ8Og4IGKOWwszo
Lf0AnRxNa0OiSjo0MvMGtWQAuLJ8ngQl
=ekRt
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close