Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

AST-2012-007: Remote crash vulnerability in IAX2 channel driver.
From: "Asterisk Security Team" <security () asterisk org>
Date: Tue, 29 May 2012 16:55:34 -0500

               Asterisk Project Security Advisory - AST-2012-007

          Product        Asterisk                                             
          Summary        Remote crash vulnerability in IAX2 channel driver.   
    Nature of Advisory   Remote crash                                         
      Susceptibility     Established calls                                    
         Severity        Moderate                                             
      Exploits Known     No                                                   
        Reported On      March 21, 2012                                       
        Reported By      mgrobecker                                           
         Posted On       May 29, 2012                                         
      Last Updated On    May 29, 2012                                         
     Advisory Contact    Richard Mudgett < rmudgett AT digium DOT com >       
         CVE Name        CVE-2012-2947                                        

    Description  A remotely exploitable crash vulnerability exists in the     
                 IAX2 channel driver if an established call is placed on      
                 hold without a suggested music class. For this to occur,     
                 the following must take place:                               
                                                                              
                 1. The setting mohinterpret=passthrough must be set on the   
                 end placing the call on hold.                                
                                                                              
                 2. A call must be established.                               
                                                                              
                 3. The call is placed on hold without a suggested            
                 music-on-hold class name.                                    
                                                                              
                 When these conditions are true, Asterisk will attempt to     
                 use an invalid pointer to a music-on-hold class name. Use    
                 of the invalid pointer will either cause a crash or the      
                 music-on-hold class name will be garbage.                    

    Resolution  Asterisk now sets the extra data parameter to null if the     
                received control frame does not have any extra data.          

                               Affected Versions
                Product              Release Series  
          Certified Asterisk          1.8.11-cert    All versions             
         Asterisk Open Source            1.8.x       All versions             
         Asterisk Open Source             10.x       All versions             

                                  Corrected In
                   Product                              Release               
             Certified Asterisk                      1.8.11-cert2             
            Asterisk Open Source                   1.8.12.1, 10.4.1           

                                       Patches                           
                                SVN URL                                    Revision   
http://downloads.asterisk.org/pub/security/AST-2012-007-1.8.11-cert.diff v1.8.11-cert 
http://downloads.asterisk.org/pub/security/AST-2012-007-1.8.diff         v1.8         
http://downloads.asterisk.org/pub/security/AST-2012-007-10.diff          v10          

       Links     https://issues.asterisk.org/jira/browse/ASTERISK-19597       

    Asterisk Project Security Advisories are posted at                        
    http://www.asterisk.org/security                                          
                                                                              
    This document may be superseded by later versions; if so, the latest      
    version will be posted at                                                 
    http://downloads.digium.com/pub/security/AST-2012-007.pdf and             
    http://downloads.digium.com/pub/security/AST-2012-007.html                

                                Revision History
          Date                  Editor                 Revisions Made         
    05/29/2012         Richard Mudgett           Initial release.             

               Asterisk Project Security Advisory - AST-2012-007
              Copyright (c) 2012 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


  By Date           By Thread  

Current thread:
  • AST-2012-007: Remote crash vulnerability in IAX2 channel driver. Asterisk Security Team (May 29)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]