what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

AST-2007-022.txt

AST-2007-022.txt
Posted Oct 11, 2007
Authored by Russell Bryant, Mark Michelson | Site asterisk.org

Asterisk Project Security Advisory - Multiple buffer overflows were discovered due to the use of sprintf in Asterisk's IMAP-specific voicemail code.

tags | advisory, overflow, imap
SHA-256 | 5e6beed403d366c145b69ef187cb6e89c970ef02a7ab577a2744fdfb90213dcc

AST-2007-022.txt

Change Mirror Download
                Asterisk Project Security Advisory - AST-2007-022

+------------------------------------------------------------------------+
| Product | Asterisk |
|--------------------+---------------------------------------------------|
| Summary | Buffer overflows in voicemail when using IMAP |
| | storage |
|--------------------+---------------------------------------------------|
| Nature of Advisory | Remotely and locally exploitable buffer overflows |
|--------------------+---------------------------------------------------|
| Susceptibility | Remote Unauthenticated Sessions |
|--------------------+---------------------------------------------------|
| Severity | Minor |
|--------------------+---------------------------------------------------|
| Exploits Known | No |
|--------------------+---------------------------------------------------|
| Reported On | October 9, 2007 |
|--------------------+---------------------------------------------------|
| Reported By | Russell Bryant <russell@digium.com> |
| | |
| | Mark Michelson <mmichelson@digium.com> |
|--------------------+---------------------------------------------------|
| Posted On | October 9, 2007 |
|--------------------+---------------------------------------------------|
| Last Updated On | October 10, 2007 |
|--------------------+---------------------------------------------------|
| Advisory Contact | Mark Michelson <mmichelson@digium.com> |
|--------------------+---------------------------------------------------|
| CVE Name | |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Description | The function "sprintf" was used heavily throughout the |
| | IMAP-specific voicemail code. After auditing the code, |
| | two vulnerabilities were discovered, both buffer |
| | overflows. |
| | |
| | The following buffer overflow required write access to |
| | Asterisk's configuration files in order to be exploited. |
| | |
| | 1) If a combination of the astspooldir (set in |
| | asterisk.conf), the voicemail context, and voicemail |
| | mailbox, were very long, then there was a buffer |
| | overflow when playing a message or forwarding a message |
| | (in the case of forwarding, the context and mailbox in |
| | question are the context and mailbox that the message |
| | was being forwarded to). |
| | |
| | The following buffer overflow could be exploited |
| | remotely. |
| | |
| | 2) If any one of, or any combination of the Content-type |
| | or Content-description headers for an e-mail that |
| | Asterisk recognized as a voicemail message contained |
| | more than a 1024 characters, then a buffer would |
| | overflow while listening to a voicemail message via a |
| | telephone. It is important to note that this did NOT |
| | affect users who get their voicemail via an e-mail |
| | client. |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Resolution | "sprintf" calls have been changed to "snprintf" wherever |
| | space was not specifically allocated to the buffer prior |
| | to the sprintf call. This includes places which are not |
| | currently prone to buffer overflows. |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Affected Versions |
|------------------------------------------------------------------------|
| Product | Release | |
| | Series | |
|----------------------------------+-------------+-----------------------|
| Asterisk Open Source | 1.0.x | Unaffected |
|----------------------------------+-------------+-----------------------|
| Asterisk Open Source | 1.2.x | Unaffected |
|----------------------------------+-------------+-----------------------|
| Asterisk Open Source | 1.4.x | All versions prior to |
| | | 1.4.13 |
|----------------------------------+-------------+-----------------------|
| Asterisk Business Edition | A.x.x | Unaffected |
|----------------------------------+-------------+-----------------------|
| Asterisk Business Edition | B.x.x | Unaffected |
|----------------------------------+-------------+-----------------------|
| AsteriskNOW | pre-release | Unaffected |
|----------------------------------+-------------+-----------------------|
| Asterisk Appliance Developer Kit | 0.x.x | Unaffected |
|----------------------------------+-------------+-----------------------|
| s800i (Asterisk Appliance) | 1.0.x | Unaffected |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Corrected In |
|------------------------------------------------------------------------|
| Product | Release |
|------------------------------------------+-----------------------------|
| Asterisk Open Source | 1.4.13 |
|------------------------------------------+-----------------------------|
|------------------------------------------+-----------------------------|
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Links | |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Asterisk Project Security Advisories are posted at |
| http://www.asterisk.org/security. |
| |
| This document may be superseded by later versions; if so, the latest |
| version will be posted at |
| http://downloads.digium.com/pub/security/AST-2007-022.pdf and |
| http://downloads.digium.com/pub/security/AST-2007-022.html. |
+------------------------------------------------------------------------+

+------------------------------------------------------------------------+
| Revision History |
|------------------------------------------------------------------------|
| Date | Editor | Revisions Made |
|--------------------+---------------------------+-----------------------|
| October 9, 2007 | mmichelson@digium.com | Initial Release |
+------------------------------------------------------------------------+

Asterisk Project Security Advisory - AST-2007-022
Copyright (c) 2007 Digium, Inc. All Rights Reserved.
Permission is hereby granted to distribute and publish this advisory in its
original, unaltered form.
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close