[AsteriskBrasil] Fwd: [asterisk-dev] AST-2009-002: Remote Crash Vulnerability in SIP channel driver

Shazaum shazaum em gmail.com
Terça Março 10 16:03:35 BRT 2009


---------- Forwarded message ----------
From: Asterisk Security Team <security em asterisk.org>
Date: 2009/3/10
Subject: [asterisk-dev] AST-2009-002: Remote Crash Vulnerability in SIP
channel driver
To: asterisk-dev em lists.digium.com


              Asterisk Project Security Advisory - AST-2009-002

  +------------------------------------------------------------------------+
  |       Product       | Asterisk                                         |
  |---------------------+--------------------------------------------------|
  |       Summary       | Remote Crash Vulnerability in SIP channel driver |
  |---------------------+--------------------------------------------------|
  | Nature of Advisory  | Denial of Service                                |
  |---------------------+--------------------------------------------------|
  |   Susceptibility    | Remote Authenticated Sessions                    |
  |---------------------+--------------------------------------------------|
  |      Severity       | Moderate                                         |
  |---------------------+--------------------------------------------------|
  |   Exploits Known    | No                                               |
  |---------------------+--------------------------------------------------|
  |     Reported On     | February 6, 2009                                 |
  |---------------------+--------------------------------------------------|
  |     Reported By     | bugs.digium.com user klaus3000                   |
  |---------------------+--------------------------------------------------|
  |      Posted On      | March 10, 2009                                   |
  |---------------------+--------------------------------------------------|
  |   Last Updated On   | March 10, 2009                                   |
  |---------------------+--------------------------------------------------|
  |  Advisory Contact   | Joshua Colp <jcolp em digium.com>                   |
  |---------------------+--------------------------------------------------|
  |      CVE Name       |                                                  |
  +------------------------------------------------------------------------+

  +------------------------------------------------------------------------+
  | Description | When configured with pedantic=yes the SIP channel driver |
  |             | performs extra request URI checking on an INVITE         |
  |             | received as a result of a SIP spiral. As part of this    |
  |             | extra checking the headers from the outgoing SIP INVITE  |
  |             | sent and the received SIP INVITE are compared. The code  |
  |             | incorrectly assumes that the string for each header      |
  |             | passed in will be non-NULL in all cases. This is         |
  |             | incorrect because if no headers are present the value    |
  |             | passed in will be NULL.                                  |
  |             |                                                          |
  |             | The values passed into the code are now checked to be    |
  |             | non-NULL before being compared.                          |
  +------------------------------------------------------------------------+

  +------------------------------------------------------------------------+
  | Resolution | Upgrade to revision 174082 of the 1.4 branch, 174085 of   |
  |            | the 1.6.0 branch, 174086 of the 1.6.1 branch, or one of   |
  |            | the releases noted below.                                 |
  |            |                                                           |
  |            | The pedantic option in the SIP channel driver can also be |
  |            | turned off to prevent this issue from occurring.          |
  +------------------------------------------------------------------------+

  +------------------------------------------------------------------------+
  |                           Affected Versions                            |
  |------------------------------------------------------------------------|
  |          Product           | Release |                                 |
  |                            | Series  |                                 |
  |----------------------------+---------+---------------------------------|
  |    Asterisk Open Source    |  1.2.x  | Not affected                    |
  |----------------------------+---------+---------------------------------|
  |    Asterisk Open Source    |  1.4.x  | Versions 1.4.22, 1.4.23,        |
  |                            |         | 1.4.23.1                        |
  |----------------------------+---------+---------------------------------|
  |    Asterisk Open Source    | 1.6.0.x | All versions prior to 1.6.0.6   |
  |----------------------------+---------+---------------------------------|
  |    Asterisk Open Source    | 1.6.1.x | All versions prior to           |
  |                            |         | 1.6.1.0-rc2                     |
  |----------------------------+---------+---------------------------------|
  |      Asterisk Addons       |  1.2.x  | Not affected                    |
  |----------------------------+---------+---------------------------------|
  |      Asterisk Addons       |  1.4.x  | Not affected                    |
  |----------------------------+---------+---------------------------------|
  |      Asterisk Addons       |  1.6.x  | Not affected                    |
  |----------------------------+---------+---------------------------------|
  | Asterisk Business Edition  |  A.x.x  | Not affected                    |
  |----------------------------+---------+---------------------------------|
  | Asterisk Business Edition  |  B.x.x  | Not affected                    |
  |----------------------------+---------+---------------------------------|
  | Asterisk Business Edition  |  C.x.x  | Only version C.2.3              |
  |----------------------------+---------+---------------------------------|
  | s800i (Asterisk Appliance) |  1.2.x  | Not affected                    |
  +------------------------------------------------------------------------+

  +------------------------------------------------------------------------+
  |                              Corrected In                              |
  |------------------------------------------------------------------------|
  |                  Product                  |          Release           |
  |-------------------------------------------+----------------------------|
  |           Asterisk Open Source            |          1.4.23.2          |
  |-------------------------------------------+----------------------------|
  |           Asterisk Open Source            |          1.6.0.6           |
  |-------------------------------------------+----------------------------|
  |           Asterisk Open Source            |        1.6.1.0-rc2         |
  |-------------------------------------------+----------------------------|
  |         Asterisk Business Edition         |          C.2.3.2           |
  +------------------------------------------------------------------------+

  +------------------------------------------------------------------------+
  |                                Patches                                 |
  |------------------------------------------------------------------------|
  |                               URL                               |Branch|
  |-----------------------------------------------------------------+------|
  |http://downloads.digium.com/pub/security/AST-2009-002-1.4.diff   |1.4   |
  |-----------------------------------------------------------------+------|
  |http://downloads.digium.com/pub/security/AST-2009-002-1.6.0.diff |1.6.0 |
  |-----------------------------------------------------------------+------|
  |http://downloads.digium.com/pub/security/AST-2009-002-1.6.1.diff |1.6.1 |
  +------------------------------------------------------------------------+

  +------------------------------------------------------------------------+
  |      Links       | http://bugs.digium.com/view.php?id=14417            |
  |                  |                                                     |
  |                  | http://bugs.digium.com/view.php?id=13547            |
  +------------------------------------------------------------------------+

  +------------------------------------------------------------------------+
  | Asterisk Project Security Advisories are posted at                     |
  | http://www.asterisk.org/security                                       |
  |                                                                        |
  | This document may be superseded by later versions; if so, the latest   |
  | version will be posted at                                              |
  | http://downloads.digium.com/pub/security/AST-2009-002.pdf and          |
  | http://downloads.digium.com/pub/security/AST-2009-002.html             |
  +------------------------------------------------------------------------+

  +------------------------------------------------------------------------+
  |                            Revision History                            |
  |------------------------------------------------------------------------|
  |       Date       |       Editor       |         Revisions Made         |
  |------------------+--------------------+--------------------------------|
  | 2009-03-10       | Joshua Colp        | Initial release                |
  +------------------------------------------------------------------------+

              Asterisk Project Security Advisory - AST-2009-002
             Copyright (c) 2009 Digium, Inc. All Rights Reserved.
 Permission is hereby granted to distribute and publish this advisory in its
                          original, unaltered form.


_______________________________________________
--Bandwidth and Colocation Provided by http://www.api-digital.com--

asterisk-dev mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-dev



-- 
Asterisk user number: 1099
Linux user: #443184
shazaum.googlepages.com
-------------- Próxima Parte ----------
Um anexo em HTML foi limpo...
URL: http://listas.asteriskbrasil.org/pipermail/asteriskbrasil/attachments/20090310/c093add1/attachment-0001.htm 


Mais detalhes sobre a lista de discussão AsteriskBrasil