Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2009-2726

Published: 12 August 2009

The SIP channel driver in Asterisk Open Source 1.2.x before 1.2.34, 1.4.x before 1.4.26.1, 1.6.0.x before 1.6.0.12, and 1.6.1.x before 1.6.1.4; Asterisk Business Edition A.x.x, B.x.x before B.2.5.9, C.2.x before C.2.4.1, and C.3.x before C.3.1; and Asterisk Appliance s800i 1.2.x before 1.3.0.3 does not use a maximum width when invoking sscanf style functions, which allows remote attackers to cause a denial of service (stack memory consumption) via SIP packets containing large sequences of ASCII decimal characters, as demonstrated via vectors related to (1) the CSeq value in a SIP header, (2) large Content-Length value, and (3) SDP.

Notes

AuthorNote
jdstrand
per the AST, this changes all the scanf functions. Upstream
says: "Note that while this potential vulnerability has existed in Asterisk
for a very long time, it is only potentially exploitable in 1.6.1 and above,
since those versions are the first that have allowed SIP packets to exceed
1500 bytes total, which does not permit strings that are large enough to
crash Asterisk." Deferring for now.

Priority

Medium

Status

Package Release Status
asterisk
Launchpad, Ubuntu, Debian
dapper Ignored
(end of life, was deferred)
hardy Ignored
(end of life)
intrepid Ignored
(end of life, was deferred)
jaunty Ignored
(end of life, was deferred)
karmic Not vulnerable
(1.6.2)
lucid Not vulnerable
(1.6.2)
maverick Not vulnerable
(1.6.2)
natty Not vulnerable
(1.6.2)
upstream
Released (1:1.6.2.0~dfsg~beta4-0ubuntu2)
Patches:
upstream: http://downloads.digium.com/pub/security/AST-2009-005-1.4.diff.txt