lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1kangU-0000yX-Tp@mail.digium.com>
Date: Thu, 05 Nov 2020 16:24:46 -0600
From: "Asterisk Security Team" <security@...erisk.org>
To: fulldisclosure@...lists.org
Subject: [FD] AST-2020-002: Outbound INVITE loop on challenge with different
	nonce.

               Asterisk Project Security Advisory ��� AST-2020-002

         Product        Asterisk                                              
         Summary        Outbound INVITE loop on challenge with different      
                        nonce.                                                
    Nature of Advisory  Denial of Service                                     
      Susceptibility    Remote Authenticated Sessions                         
         Severity       Minor                                                 
      Exploits Known    Yes                                                   
       Reported On      July 28, 2020                                         
       Reported By      Sebastian Damm, Ruslan Lazin                          
        Posted On       November 5, 2020                                      
     Last Updated On    November 5, 2020                                      
     Advisory Contact   bford AT sangoma DOT com                              
         CVE Name       

      Description     If Asterisk is challenged on an outbound INVITE and     
                      the nonce is changed in each response, Asterisk will    
                      continually send INVITEs in a loop. This causes         
                      Asterisk to consume more and more memory since the      
                      transaction will never terminate (even if the call is   
                      hung up), ultimately leading to a restart or shutdown   
                      of Asterisk. Outbound authentication must be            
                      configured on the endpoint for this to occur.           
    Modules Affected  res_pjsip                                               

    Resolution  In the fixed versions of Asterisk, a counter has been added   
                that will automatically stop sending INVITEs after reaching   
                the limit.                                                    

                               Affected Versions       
                         Product                       Release  
                                                       Series   
                  Asterisk Open Source                  13.x    All versions  
                  Asterisk Open Source                  16.x    All versions  
                  Asterisk Open Source                  17.x    All versions  
                  Asterisk Open Source                  18.x    All versions  
                   Certified Asterisk                   16.8    All versions  

                                  Corrected In                    
                              Product                              Release    
                        Asterisk Open Source                       13.37.1    
                        Asterisk Open Source                       16.14.1    
                        Asterisk Open Source                        17.8.1    
                        Asterisk Open Source                        18.0.1    
                         Certified Asterisk                       16.8-cert5  

                                     Patches                         
                                SVN URL                               Revision  
   http://downloads.asterisk.org/pub/security/AST-2020-002-13.diff   Asterisk   
                                                                     13         
   http://downloads.asterisk.org/pub/security/AST-2020-002-16.diff   Asterisk   
                                                                     16         
   http://downloads.asterisk.org/pub/security/AST-2020-002-17.dif    Asterisk   
                                                                     17         
   http://downloads.asterisk.org/pub/security/AST-2020-002-18.dif    Asterisk   
                                                                     18         
   http://downloads.asterisk.org/pub/security/AST-2020-002-16.8.diff Certified  
                                                                     Asterisk   
                                                                     16.8-cert5 

    Links  https://issues.asterisk.org/jira/browse/ASTERISK-29013             

    Asterisk Project Security Advisories are posted at                        
    http://www.asterisk.org/security                                          
                                                                              
    This document may be superseded by later versions; if so, the latest      
    version will be posted at                                                 
    http://downloads.digium.com/pub/security/AST-2020-002.pdf and             
    http://downloads.digium.com/pub/security/AST-2020-002.html                

                                Revision History  
                        Date                       Editor    Revisions Made   
    November 5, 2020                              Ben Ford  Initial Revision  

                      Asterisk Project Security Advisory -
               Copyright �� 2019 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.


_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ