Skip to main content

Tags Security Advisory

SIPGO: Response DoS vulnerability via nil pointer dereference

Description

A nil pointer dereference vulnerability was discovered in the SIPGO library’s NewResponseFromRequest function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header.

Read more about SIPGO: Response DoS vulnerability via nil pointer dereference

rtpengine: RTP Inject and RTP Bleed vulnerabilities despite proper configuration

Published on Jul 31, 2025 in , , ,

Description

Media servers often support source address learning to dynamically adapt to network conditions and client behavior. This is especially useful in scenarios involving NAT where the source IP and port of incoming RTP packets may differ from what was initially signaled via SDP over SIP. However, this mechanism can be exploited for two types of attacks if malicious packets are accepted as legitimate:

Read more about rtpengine: RTP Inject and RTP Bleed vulnerabilities despite proper configuration

FreeSWITCH: denial of service via DTLS Hello packets during call initiation

TL;DR

When handling DTLS-SRTP for media setup, FreeSWITCH is susceptible to Denial of Service due to a race condition in the hello handshake phase of the DTLS protocol. This attack can be done continuously, thus denying new DTLS-SRTP encrypted calls during the attack.

Read more about FreeSWITCH: denial of service via DTLS Hello packets during call initiation

rtpengine: denial of service via DTLS Hello packets during call initiation

TL;DR

When handling DTLS-SRTP for media setup, RTPEngine is susceptible to Denial of Service due to a race condition in the hello handshake phase of the DTLS protocol. This attack can be done continuously, thus denying new DTLS encrypted calls during the attack.

Read more about rtpengine: denial of service via DTLS Hello packets during call initiation

Asterisk: denial of service via DTLS Hello packets during call initiation

TL;DR

When handling DTLS-SRTP for media setup, Asterisk is susceptible to Denial of Service due to a race condition in the hello handshake phase of the DTLS protocol. This attack can be done continuously, thus denying new DTLS-SRTP encrypted calls during the attack.

Read more about Asterisk: denial of service via DTLS Hello packets during call initiation

FreeSWITCH: unauthenticated SIP SUBSCRIBE requests by default

Published on Oct 25, 2021 in , ,

Description

By default, SIP requests of the type SUBSCRIBE are not authenticated in the affected versions of FreeSWITCH. Although this issue was fixed in version v1.10.6, installations upgraded to the fixed version of FreeSWITCH from an older version, may still be vulnerable if the configuration is not updated accordingly. For good reason, by default, software upgrades do not update the configuration.

Read more about FreeSWITCH: unauthenticated SIP SUBSCRIBE requests by default

FreeSWITCH: unauthenticated SIP MESSAGE requests allow spam and spoofing

Published on Oct 25, 2021 in , ,

Description

By default, SIP requests of the type MESSAGE (RFC 3428) are not authenticated in the affected versions of FreeSWITCH. MESSAGE requests are relayed to SIP user agents registered with the FreeSWITCH server without requiring any authentication. Although this behaviour can be changed by setting the auth-messages parameter to true, it is not the default setting.

Read more about FreeSWITCH: unauthenticated SIP MESSAGE requests allow spam and spoofing

FreeSWITCH: SIP digest leak for configured gateways

Published on Oct 25, 2021 in , , ,

Description

An attacker can perform a SIP digest leak attack against FreeSWITCH and receive the challenge response of a gateway configured on the FreeSWITCH server. This is done by challenging FreeSWITCH’s SIP requests with the realm set to that of the gateway, thus forcing FreeSWITCH to respond with the challenge response which is based on the password of that targeted gateway.

Read more about FreeSWITCH: SIP digest leak for configured gateways

FreeSWITCH: denial of service via SIP flooding

Description

When flooding FreeSWITCH with SIP messages, it was observed that after a number of seconds the process was killed by the operating system due to memory exhaustion. The following excerpt from syslog shows one such instance:

Read more about FreeSWITCH: denial of service via SIP flooding

FreeSWITCH: denial of service via invalid SRTP packets

TL;DR

When handling SRTP calls, FreeSWITCH is susceptible to a DoS where calls can be terminated by remote attackers. This attack can be done continuously, thus denying encrypted calls during the attack.

Description

When a media port that is handling SRTP traffic is flooded with a specially crafted SRTP packet, the call is terminated leading to denial of service. This issue was reproduced when using the SDES key exchange mechanism in a SIP environment as well as when using the DTLS key exchange mechanism in a WebRTC environment.

Read more about FreeSWITCH: denial of service via invalid SRTP packets