Asterisk Project Security Advisory - AST-2011-007
Product |
Asterisk |
Summary |
Remote Crash Vulnerability in SIP channel driver |
Nature of Advisory |
Remote attacker can crash an Asterisk server |
Susceptibility |
Remote Authenticated Sessions |
Severity |
Moderate |
Exploits Known |
No |
Reported On |
May 23, 2011 |
Reported By |
Jonathan Rose jrose@digium.com |
Posted On |
June 02, 2011 |
Last Updated On |
June 02, 2011 |
Advisory Contact |
Jonathan Rose jrose@digium.com |
CVE Name |
CVE-2011-2216 |
Description |
If a remote user initiates a SIP call and the recipient picks up, the remote user can reply with a malformed Contact header that Asterisk will improperly handle and cause a crash due to a segmentation fault. |
Resolution |
Asterisk now immediately initializes buffer strings coming into the parse_uri_full function to prevent outside functions from receiving a NULL value pointer. This should increase the safety of any function that uses parse_uri or its wrapper functions which previously would attempt to work in the presence of a parse_uri failure by reading off of potentially uninitialized strings. |
Affected Versions |
||
Product |
Release Series |
|
Asterisk Open Source |
1.8.x |
All versions |
Corrected In |
|
Product |
Release |
Asterisk Open Source |
1.8.4.2 |
Patches |
|
URL |
Branch |
Http://downloads.asterisk.org/pub/security/AST-2011-007-1.8.diff |
1.8 |
Asterisk Project Security Advisories are posted at http://www.asterisk.org/security This document may be superseded by later versions; if so, the latest version will be posted at http://downloads.digium.com/pub/security/AST-2011-007.pdf and http://downloads.digium.com/pub/security/AST-2011-007.html |
Revision History |
||
Date |
Editor |
Revisions Made |
06/02/11 |
Jonathan Rose |
Initial Release |
Asterisk
Project Security Advisory - AST-2011-007
Copyright ©
2011 Digium, Inc. All Rights Reserved.
Permission is hereby
granted to distribute and publish this advisory in its original,
unaltered form.