<div dir="ltr">psc<br><br><div class="gmail_quote">---------- Forwarded message ----------<br>From: <b class="gmail_sendername">Asterisk Security Team</b> <span dir="ltr">&lt;<a href="mailto:security@asterisk.org">security@asterisk.org</a>&gt;</span><br>
Date: 2013/8/27<br>Subject: [asterisk-dev] AST-2013-004: Remote Crash From Late Arriving SIP ACK With SDP<br>To: <a href="mailto:asterisk-dev@lists.digium.com">asterisk-dev@lists.digium.com</a><br><br><br>               Asterisk Project Security Advisory - AST-2013-004<br>

<br>
          Product         Asterisk<br>
          Summary         Remote Crash From Late Arriving SIP ACK With SDP<br>
     Nature of Advisory   Remote Crash<br>
       Susceptibility     Remote Unauthenticated Sessions<br>
          Severity        Major<br>
       Exploits Known     None<br>
        Reported On       February 11, 2013<br>
        Reported By       Colin Cuthbertson<br>
         Posted On        August 27, 2013<br>
      Last Updated On     August 27, 2013<br>
      Advisory Contact    Joshua Colp &lt;jcolp AT digium DOT com&gt;<br>
          CVE Name        Pending<br>
<br>
    Description  A remotely exploitable crash vulnerability exists in the<br>
                 SIP channel driver if an ACK with SDP is received after the<br>
                 channel has been terminated. The handling code incorrectly<br>
                 assumes that the channel will always be present.<br>
<br>
    Resolution  A check has now been added which only parses SDP and applies<br>
                it if an Asterisk channel is present.<br>
<br>
                Note that Walter Doekes, OSSO B.V., is responsible for<br>
                diagnosing and providing the fix for this issue.<br>
<br>
                               Affected Versions<br>
              Product             Release Series<br>
        Asterisk Open Source          1.8.x       1.8.17.0 and above<br>
        Asterisk Open Source           11.x       All versions<br>
         Certified Asterisk           1.8.15      All versions<br>
         Certified Asterisk            11.2       All versions<br>
<br>
                                  Corrected In<br>
                 Product                              Release<br>
          Asterisk Open Source                   1.8.23.1, 11.5.1<br>
           Certified Asterisk                1.8.15-cert3, 11.2-cert2<br>
<br>
                                     Patches<br>
                                SVN URL                                  Revision<br>
<a href="http://downloads.asterisk.org/pub/security/AST-2013-004-1.8.diff" target="_blank">http://downloads.asterisk.org/pub/security/AST-2013-004-1.8.diff</a>         Asterisk<br>
                                                                         1.8<br>
<a href="http://downloads.asterisk.org/pub/security/AST-2013-004-11.diff" target="_blank">http://downloads.asterisk.org/pub/security/AST-2013-004-11.diff</a>          Asterisk<br>
                                                                         11<br>
<a href="http://downloads.asterisk.org/pub/security/AST-2013-004-1.8.15-cert.diff" target="_blank">http://downloads.asterisk.org/pub/security/AST-2013-004-1.8.15-cert.diff</a> Certified<br>
                                                                         Asterisk<br>
                                                                         1.8.15<br>
<a href="http://downloads.asterisk.org/pub/security/AST-2013-004-11.2-cert.diff" target="_blank">http://downloads.asterisk.org/pub/security/AST-2013-004-11.2-cert.diff</a>   Certified<br>
                                                                         Asterisk<br>
                                                                         11.1<br>
<br>
       Links     <a href="https://issues.asterisk.org/jira/browse/ASTERISK-21064" target="_blank">https://issues.asterisk.org/jira/browse/ASTERISK-21064</a><br>
<br>
    Asterisk Project Security Advisories are posted at<br>
    <a href="http://www.asterisk.org/security" target="_blank">http://www.asterisk.org/security</a><br>
<br>
    This document may be superseded by later versions; if so, the latest<br>
    version will be posted at<br>
    <a href="http://downloads.digium.com/pub/security/AST-2013-004.pdf" target="_blank">http://downloads.digium.com/pub/security/AST-2013-004.pdf</a> and<br>
    <a href="http://downloads.digium.com/pub/security/AST-2013-004.html" target="_blank">http://downloads.digium.com/pub/security/AST-2013-004.html</a><br>
<br>
                                Revision History<br>
          Date                 Editor                  Revisions Made<br>
    2013-08-22         Joshua Colp              Initial revision.<br>
<br>
               Asterisk Project Security Advisory - AST-2013-004<br>
              Copyright (c) 2013 Digium, Inc. All Rights Reserved.<br>
  Permission is hereby granted to distribute and publish this advisory in its<br>
                           original, unaltered form.<br>
<br>
<br>
--<br>
_____________________________________________________________________<br>
-- Bandwidth and Colocation Provided by <a href="http://www.api-digital.com" target="_blank">http://www.api-digital.com</a> --<br>
<br>
asterisk-dev mailing list<br>
To UNSUBSCRIBE or update options visit:<br>
   <a href="http://lists.digium.com/mailman/listinfo/asterisk-dev" target="_blank">http://lists.digium.com/mailman/listinfo/asterisk-dev</a><br>
</div><br><br clear="all"><div><br></div>-- <br><span style="font-family:trebuchet ms,sans-serif">Sylvio Jollenbeck<br><font size="1"><a href="http://www.hosannatecnologia.com.br/" target="_blank">www.hosannatecnologia.com.br</a></font></span><br>
<img src="http://www.hosannatecnologia.com.br/pixel.fw.png"><br>
</div>