lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1aqpfe-0002hn-12@mail.digium.com>
Date: Thu, 14 Apr 2016 17:23:30 -0500
From: "Asterisk Security Team" <security@...erisk.org>
To: fulldisclosure@...lists.org
Subject: [FD] AST-2016-005: TCP denial of service in PJProject

               Asterisk Project Security Advisory - AST-2016-005

         Product        Asterisk                                              
         Summary        TCP denial of service in PJProject                    
    Nature of Advisory  Crash/Denial of Service                               
      Susceptibility    Remote Unauthenticated Sessions                       
         Severity       Critical                                              
      Exploits Known    No                                                    
       Reported On      February 15, 2016                                     
       Reported By      George Joseph                                         
        Posted On       
     Last Updated On    March 3, 2016                                         
     Advisory Contact   Mark Michelson <mark DOT michelson AT digium DOT      
                        com>                                                  
         CVE Name       

    Description  PJProject has a limit on the number of TCP connections that  
                 it can accept. Furthermore, PJProject does not close TCP     
                 connections it accepts. By default, this value is            
                 approximately 60.                                            
                                                                              
                 An attacker can deplete the number of allowed TCP            
                 connections by opening TCP connections and sending no data   
                 to Asterisk.                                                 
                                                                              
                 If PJProject has been compiled in debug mode, then once the  
                 number of allowed TCP connections has been depleted, the     
                 next attempted TCP connection to Asterisk will crash due to  
                 an assertion in PJProject.                                   
                                                                              
                 If PJProject has not been compiled in debug mode, then any   
                 further TCP connection attempts will be rejected. This       
                 makes Asterisk unable to process TCP SIP traffic.            
                                                                              
                 Note that this only affects TCP/TLS, since UDP is            
                 connectionless. Also note that this does not affect          
                 chan_sip.                                                    

    Resolution  PJProject has a compile-time constant that controls the       
                maximum number of TCP connections that can be handled. Those  
                who compile PJProject on their own are encouraged to set      
                this to a value that is more amenable to the number of TCP    
                connections that Asterisk should be able to handle. In        
                PJProject's pjlib/include/pj/config_site.h, add the           
                following prior to compiling PJProject:                       
                                                                              
                # define PJ_IOQUEUE_MAX_HANDLES (FD_SETSIZE)                  
                                                                              
                This is part of a larger set of recommended definitions to    
                place in config_site.h of PJProject. See the Asterisk         
                "Building and Installing PJProject" wiki page for other       
                recommended settings.                                         
                                                                              
                Packagers of PJProject have updated their packages to have    
                these constants defined, so if your package is kept up to     
                date, you should already be fine.                             
                                                                              
                In addition, the Asterisk project has recently been modified  
                to be able to perform a static build of PJProject. By         
                running the Asterisk configure script with the                
                --with-pjproject-bundled option, the latest PJProject will    
                be downloaded and installed, and the compile-time constants   
                will be set to appropriate values.                            
                                                                              
                Asterisk has also been updated to monitor incoming TCP        
                connections. If a TCP connection is opened and no SIP         
                request is received on that connection within a certain       
                amount of time, then Asterisk will shut down the connection.  

                               Affected Versions       
                         Product                       Release  
                                                       Series   
                  Asterisk Open Source                  13.x    All Versions  

                                  Corrected In                    
                              Product                              Release    
                        Asterisk Open Source                        13.8.1    
                         Certified Asterisk                       13.1-cert5  

                                    Patches
                 SVN URL                              Revision                

           Links         

    Asterisk Project Security Advisories are posted at                        
    http://www.asterisk.org/security                                          
                                                                              
    This document may be superseded by later versions; if so, the latest      
    version will be posted at                                                 
    http://downloads.digium.com/pub/security/AST-2016-005.pdf and             
    http://downloads.digium.com/pub/security/AST-2016-005.html                

                                Revision History
        Date            Editor                    Revisions Made              

               Asterisk Project Security Advisory - AST-2016-005
              Copyright (c) 2016 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.


_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ