[Secure-testing-team] Bug#541441: CVE-2009-2726: Asterisk SIP Channel Driver Denial of Service
Giuseppe Iuculano
giuseppe at iuculano.it
Fri Aug 14 08:51:55 UTC 2009
Package: asterisk
Severity: serious
Tags: security
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for asterisk.
CVE-2009-2726[0]:
| The SIP channel driver in Asterisk Open Source 1.2.x before 1.2.34,
| 1.4.x before 1.4.26.1, 1.6.0.x before 1.6.0.12, and 1.6.1.x before
| 1.6.1.4; Asterisk Business Edition A.x.x, B.x.x before B.2.5.9, C.2.x
| before C.2.4.1, and C.3.x before C.3.1; and Asterisk Appliance s800i
| 1.2.x before 1.3.0.3 does not use a maximum width when invoking sscanf
| style functions, which allows remote attackers to cause a denial of
| service (stack memory consumption) via SIP packets containing large
| sequences of ASCII decimal characters, as demonstrated via vectors
| related to (1) the CSeq value in a SIP header, (2) large
| Content-Length value, and (3) SDP.
If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.
For further information see:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2726
http://security-tracker.debian.net/tracker/CVE-2009-2726
Cheers,
Giuseppe
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAkqFJagACgkQNxpp46476aqfQgCfZWL0q6UVuBA6xoRE/GwoxYhX
dEYAnigAWnQbYF0SS/n+nZXcweMCdRx1
=gCe6
-----END PGP SIGNATURE-----
More information about the Secure-testing-team
mailing list