ESB-2017.2868 - [Win][UNIX/Linux] Asterix: Execute arbitrary code/commands - Existing account 2017-11-10

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.2868
            Asterisk Project Security Advisory - AST-2017-009,
                        AST-2017-010, AST-2017-011
                             10 November 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Asterix
Publisher:         Digium
Operating System:  Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account      
                   Denial of Service               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade

Original Bulletin: 
   http://downloads.digium.com/pub/security/AST-2017-009.html
   http://downloads.digium.com/pub/security/AST-2017-010.html
   http://downloads.digium.com/pub/security/AST-2017-011.html

Comment: This bulletin contains three (3) Digium security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

               Asterisk Project Security Advisory - AST-2017-009

         Product        Asterisk                                              
         Summary        Buffer overflow in pjproject header parsing can       
                        cause crash in Asterisk                               
    Nature of Advisory  Denial of Service                                     
      Susceptibility    Remote Unauthenticated Sessions                       
         Severity       Critical                                              
      Exploits Known    No                                                    
       Reported On      October 5, 2017                                       
       Reported By      Youngsung Kim at LINE Corporation                     
        Posted On       
     Last Updated On    October 25, 2017                                      
     Advisory Contact   gjoseph AT digium DOT com                             
         CVE Name       

    Description  By carefully crafting invalid values in the Cseq and the     
                 Via header port, pjproject's packet parsing code can create  
                 strings larger than the buffer allocated to hold them. This  
                 will usually cause Asterisk to crash immediately. The        
                 packets do not have to be authenticated.                     

    Resolution  Stricter validation is now done on strings that represent     
                numeric values before they are converted to intrinsic types.  
                Invalid values now cause packet processing to stop and error  
                messages to be emitted.                                       

                               Affected Versions
                Product              Release Series  
         Asterisk Open Source             13.x       All Releases             
         Asterisk Open Source             14.x       All Releases             
         Asterisk Open Source             15.x       All Releases             
          Certified Asterisk             13.13       All Releases             

                                  Corrected In
                 Product                              Release                 
           Asterisk Open Source               13.18.1, 14.7.1, 15.1.1         
            Certified Asterisk                      13.13-cert7               

                                     Patches                          
                                SVN URL                               Revision  
   http://downloads.asterisk.org/pub/security/AST-2017-009-13.diff    Asterisk  
                                                                      13        
   http://downloads.asterisk.org/pub/security/AST-2017-009-14.diff    Asterisk  
                                                                      14        
   http://downloads.asterisk.org/pub/security/AST-2017-009-15.diff    Asterisk  
                                                                      15        
   http://downloads.asterisk.org/pub/security/AST-2017-009-13.13.diff Certified 
                                                                      Asterisk  
                                                                      13.13     

       Links     https://issues.asterisk.org/jira/browse/ASTERISK-27319       

    Asterisk Project Security Advisories are posted at                        
    http://www.asterisk.org/security                                          
                                                                              
    This document may be superseded by later versions; if so, the latest      
    version will be posted at                                                 
    http://downloads.digium.com/pub/security/AST-2017-009.pdf and             
    http://downloads.digium.com/pub/security/AST-2017-009.html                

                                Revision History
          Date                  Editor                 Revisions Made         
    October 25, 2017   George Joseph             Initial Revision             

               Asterisk Project Security Advisory - AST-2017-009
               Copyright © 2017 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.

================================================================================

              Asterisk Project Security Advisory - AST-2017-010

         Product        Asterisk                                              
         Summary        Buffer overflow in CDR's set user                     
    Nature of Advisory  Buffer Overflow                                       
      Susceptibility    Remote Authenticated Sessions                         
         Severity       Moderate                                              
      Exploits Known    No                                                    
       Reported On      October 9, 2017                                       
       Reported By      Richard Mudgett                                       
        Posted On       
     Last Updated On    October 25, 2017                                      
     Advisory Contact   Rmudgett AT digium DOT com                            
         CVE Name       

    Description  No size checking is done when setting the user field for     
                 Party B on a CDR. Thus, it is possible for someone to use    
                 an arbitrarily large string and write past the end of the    
                 user field storage buffer. The earlier AST-2017-001          
                 advisory for the CDR user field overflow was for the Party   
                 A buffer.                                                    
                                                                              
                 This currently affects any system using CDR's that also      
                 make use of the following:                                   
                                                                              
                 * The 'X-ClientCode' header within a SIP INFO message when   
                 using chan_sip and                                           
                                                                              
                 the 'useclientcode' option is enabled (note, it's disabled   
                 by default).                                                 
                                                                              
                 * The CDR dialplan function executed from AMI when setting   
                 the user field.                                              
                                                                              
                 * The AMI Monitor action when using a long file name/path.   

    Resolution  The CDR engine now only copies up to the maximum allowed      
                characters into the user field. Any characters outside the    
                maximum are truncated.                                        

                               Affected Versions       
                         Product                       Release  
                                                       Series   
                  Asterisk Open Source                  13.x    All Releases  
                  Asterisk Open Source                  14.x    All Releases  
                  Asterisk Open Source                  15.x    All Releases  
                   Certified Asterisk                   13.13   All Releases  

                                  Corrected In
          Product                              Release                        
    Asterisk Open Source               13.18.1, 14.7.1, 15.1.1                
     Certified Asterisk                      13.13-cert7                      

                                     Patches                          
                                SVN URL                               Revision  
   http://downloads.asterisk.org/pub/security/AST-2017-010-13.diff    Asterisk  
                                                                      13        
   http://downloads.asterisk.org/pub/security/AST-2017-010-14.diff    Asterisk  
                                                                      14        
   http://downloads.asterisk.org/pub/security/AST-2017-010-15.diff    Asterisk  
                                                                      15        
   http://downloads.asterisk.org/pub/security/AST-2017-010-13.13.diff Certified 
                                                                      Asterisk  
                                                                      13.13     

    Links  https://issues.asterisk.org/jira/browse/ASTERISK-27337             

    Asterisk Project Security Advisories are posted at                        
    http://www.asterisk.org/security                                          
                                                                              
    This document may be superseded by later versions; if so, the latest      
    version will be posted at                                                 
    http://downloads.digium.com/pub/security/AST-2017-010.pdf and             
    http://downloads.digium.com/pub/security/AST-2017-010.html                

                                Revision History
                    Date                       Editor        Revisions Made   
    October 12, 2017                       Richard Mudgett  Initial Revision  

               Asterisk Project Security Advisory - AST-2017-010
               Copyright © 2017 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.


================================================================================


               Asterisk Project Security Advisory - AST-2017-011

         Product        Asterisk                                              
         Summary        Memory leak in pjsip session resource                 
    Nature of Advisory  Memory leak                                           
      Susceptibility    Remote Sessions                                       
         Severity       Minor                                                 
      Exploits Known    No                                                    
       Reported On      October 15, 2017                                      
       Reported By      Correy Farrell                                        
        Posted On       
     Last Updated On    October 19, 2017                                      
     Advisory Contact   kharwell AT digium DOT com                            
         CVE Name       

    Description  A memory leak occurs when an Asterisk pjsip session object   
                 is created and that call gets rejected before the session    
                 itself is fully established. When this happens the session   
                 object never gets destroyed.                                 

    Resolution  Asterisk now releases the session object and all associated   
                memory when a call gets rejected.                             

                               Affected Versions       
                         Product                       Release  
                                                       Series   
                  Asterisk Open Source                  13.x    13.5.0+       
                  Asterisk Open Source                  14.x    All Releases  
                  Asterisk Open Source                  15.x    All Releases  
                   Certified Asterisk                   13.13   All Releases  

                                  Corrected In
          Product                              Release                        
    Asterisk Open Source               13.18.1, 14.7.1, 15.1.1                
     Certified Asterisk                      13.13-cert7                      

                                     Patches                          
                                SVN URL                               Revision  
   http://downloads.asterisk.org/pub/security/AST-2017-011-13.diff    Asterisk  
                                                                      13        
   http://downloads.asterisk.org/pub/security/AST-2017-011-14.diff    Asterisk  
                                                                      14        
   http://downloads.asterisk.org/pub/security/AST-2017-011-15.diff    Asterisk  
                                                                      15        
   http://downloads.asterisk.org/pub/security/AST-2017-011-13.13.diff Certified 
                                                                      Asterisk  
                                                                      13.13     

    Links  https://issues.asterisk.org/jira/browse/ASTERISK-27345             

    Asterisk Project Security Advisories are posted at                        
    http://www.asterisk.org/security                                          
                                                                              
    This document may be superseded by later versions; if so, the latest      
    version will be posted at                                                 
    http://downloads.digium.com/pub/security/AST-2017-011.pdf and             
    http://downloads.digium.com/pub/security/AST-2017-011.html                

                                Revision History
                     Date                       Editor       Revisions Made   
    October 19, 2017                         Kevin Harwell  Initial Revision  

               Asterisk Project Security Advisory - AST-2017-011
              Copyright (c) 2017 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBWgU4vYx+lLeg9Ub1AQiJGxAAqf0kMHi0neg33YIj3q2KRovsV4MxjKNJ
dvKcmf4eadCEq1GgLSIqxZvYxWvhx+F+NBXUvi0ph37aFk5FxEz1KusjrjBvxkQs
VJXuiaLqQa+FIXD4JMcUYOl3b7H/+EzOoPIFg+AgcroOS4fKFKlu7pkPyLgy9kx2
opVmhLV3TmZi8dzzXTWlVLOCEspMmm9Rf+7iD/3h0nIfxL9EgbRmJ4Y789KAR3Zn
VH2bEn3NLU2oeMQjx215VG9grwGkjkWDG6VqGAGcCdGj1FatPK89DB8nMpuJMtHU
miuIweSZs5Aal/R9blMNZtq1b1FVedftErHw2fpg9NOuI9nMlczRMNYMBd2zfOux
ANoI68rtO9iDeOKxQ20vKZJw1gsXhN5ukwVd1mcJWmXoqKB0UIY2q1ox2RFyk8J5
+V32SZ+OqGkxdAqWT6vnmHuTaSERr6bFp5JxkjRgA/gmCyJR/fOVUj3QbfyNWFDt
qy/msgHolQtx+t4kTC/uaz7DP42p8JANPt4E5kn8wlPnS6CHCt86PRzauf8y+LB0
oFLoHBTffnSd4anY92uMctOYceZWPUG5fU2luqITMpST3mWtanRc5YXHM13bl4kj
afJA3nA4G2Z2D+MvVE5+RwrNtRlcZs5W0UdsYysmd+9MXx+h4Enyw7l95dKrR0eY
UoBl0speyy4=
=rSEH
-----END PGP SIGNATURE-----

« Back to bulletins