copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2014.1636 - [Win][UNIX/Linux] Asterisk: Denial of service - Remote/unauthenticated

Date: 22 September 2014

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.1636
             Asterisk Project Security Advisory - AST-2014-009
                             22 September 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Asterisk
Publisher:         Digium
Operating System:  Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade

Original Bulletin: 
   http://downloads.digium.com/pub/security/AST-2014-009.html

- --------------------------BEGIN INCLUDED TEXT--------------------

               Asterisk Project Security Advisory - AST-2014-009

         Product        Asterisk                                              
         Summary        Remote crash based on malformed SIP subscription      
                        requests                                              
    Nature of Advisory  Remotely triggered crash of Asterisk                  
      Susceptibility    Remote authenticated sessions                         
         Severity       Major                                                 
      Exploits Known    No                                                    
       Reported On      30 July, 2014                                         
       Reported By      Mark Michelson                                        
        Posted On       18 September, 2014                                    
     Last Updated On    September 18, 2014                                    
     Advisory Contact   Mark Michelson <mmichelson AT digium DOT com>         
         CVE Name       Pending                                               

    Description  It is possible to trigger a crash in Asterisk by sending a   
                 SIP SUBSCRIBE request with unexpected mixes of headers for   
                 a given event package. The crash occurs because Asterisk     
                 allocates data of one type at one layer and then interprets  
                 the data as a separate type at a different layer. The crash  
                 requires that the SUBSCRIBE be sent from a configured        
                 endpoint, and the SUBSCRIBE must pass any authentication     
                 that has been configured.                                    
                                                                              
                 Note that this crash is Asterisk's PJSIP-based               
                 res_pjsip_pubsub module and not in the old chan_sip module.  

    Resolution  Type-safety has been built into the pubsub API where it       
                previously was absent. A test has been added to the           
                testsuite that previously would have triggered the crash.     

                               Affected Versions      
                        Product                       Release  
                                                      Series   
                  Asterisk Open Source                 1.8.x   Unaffected     
                  Asterisk Open Source                 11.x    Unaffected     
                  Asterisk Open Source                 12.x    12.1.0 and up  
                   Certified Asterisk                 1.8.15   Unaffected     
                   Certified Asterisk                  11.6    Unaffected     

                                  Corrected In         
                         Product                              Release         
                  Asterisk Open Source                        12.5.1          

                                    Patches                          
                                SVN URL                              Revision 
   http://downloads.asterisk.org/pub/security/AST-2014-009-12.diff   Asterisk 
                                                                     12       

    Links  https://issues.asterisk.org/jira/browse/ASTERISK-24136             

    Asterisk Project Security Advisories are posted at                        
    http://www.asterisk.org/security                                          
                                                                              
    This document may be superseded by later versions; if so, the latest      
    version will be posted at                                                 
    http://downloads.digium.com/pub/security/AST-2014-009.pdf and             
    http://downloads.digium.com/pub/security/AST-2014-009.html                

                                Revision History
         Date            Editor                  Revisions Made               
    19 August, 2014  Mark Michelson  Initial version of document              

               Asterisk Project Security Advisory - AST-2014-009
              Copyright (c) 2014 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=IqDH
-----END PGP SIGNATURE-----