Skip to main content

Tags Asterisk

Asterisk Skinny: memory exhaustion denial of service

Published on May 23, 2017 in , ,

Description

Sending one malformed Skinny message to port 2000 will exhaust Asterisk’s memory resulting in a crash.

Impact

Abuse of this issue allows attackers to crash Asterisk when Skinny is exposed to attackers.

How to reproduce the issue

Start Asterisk and make sure the chan_skinny module is loaded. Then execute:

Read more about Asterisk Skinny: memory exhaustion denial of service

Asterisk PJSIP: out-of-bound memory access in multipart parser

Published on May 23, 2017 in , , ,

Description

A specially crafted SIP message with a malformed multipart body was found to cause a segmentation fault.

Impact

Abuse of this vulnerability leads to denial of service (DoS), and potentially remote code execution (RCE), in Asterisk when chan_pjsip is in use. This vulnerability is likely to affect other code that makes use of PJSIP.

Read more about Asterisk PJSIP: out-of-bound memory access in multipart parser

Asterisk PJSIP: heap overflow in CSeq header parsing

Description

A specially crafted SIP message with a long CSEQ value will cause a heap overflow in PJSIP.

Impact

Abuse of this vulnerability leads to denial of service in Asterisk when chan_pjsip is in use. This vulnerability is likely to be abused for remote code execution and may affect other code that makes use of PJSIP.

Read more about Asterisk PJSIP: heap overflow in CSeq header parsing

If SIPVicious gives you a ring…

Note: SIPVicious version 0.28 is out, go get it.

I like to keep an eye on the social media and Google alerts for SIPVicious and in the last few months I noticed a rise in mentions of the tools. Specifically, a number of Korean twitter users (who have their service with KT, a VoIP service provider) complaining about receiving a call from a caller-id showing ‘SIPVicious’.

Read more about If SIPVicious gives you a ring...