Product

Asterisk

Summary

Remote crash vulnerability in TCP/TLS server

Nature of Advisory

Denial of Service

Susceptibility

Remote Unauthenticated Sessions

Severity

Critical

Exploits Known

No

Reported On

March 1, 2011

Reported By

Blake Cornell <blake@remoteorigin.com> and Chris Maj <chris@penguinpbx.com>

Posted On

March 16, 2011

Last Updated On

March 14, 2011

Advisory Contact

Terry Wilson <twilson@digium.com>

 

Description

Rapidly opening and closing TCP connections to services using the ast_tcptls_* API (primarily chan_sip, manager, and res_phoneprov) can cause Asterisk to crash after dereferencing a NULL pointer.

 

Resolution

Failure of the fdopen call is detected and dereferencing the NULL pointer is avoided.

 

Affected Versions

Product

Release Series

 

Asterisk Open Source

1.6.1.x

All versions

Asterisk Open Source

1.6.2.x

All versions

Asterisk Open Source

1.8.x

All versions

 

Corrected In

Product

Release

Asterisk Open Source

1.6.1.23, 1.6.2.17.1, 1.8.3.1

 

 

 

 

Patches

URL

Branch

http://downloads.asterisk.org/pub/security/AST-2011-004-1.6.1.diff

1.6.1

http://downloads.asterisk.org/pub/security/AST-2011-004-1.6.2.diff

1.6.2

http://downloads.asterisk.org/pub/security/AST-2011-004-1.8.diff

1.8

 

 

Links

 

 

Asterisk Project Security Advisories are posted at http://www.asterisk.org/security

This document may be superseded by later versions; if so, the latest version will be posted at http://downloads.digium.com/pub/security/AST-2011-004.pdf and http://downloads.digium.com/pub/security/AST-2011-004.html

 

Revision History

Date

Editor

Revisions Made

2011-03-14

Terry Wilson

Initial release