[SR-Users] Asterisk Security Advisory (AST-2016-009)
Fred Posner
fred at palner.com
Fri Dec 9 00:05:39 CET 2016
Thank you for the post-- definitely appreciate you sharing it on this list.
--fred
On 12/8/16 6:02 PM, Matthew Jordan wrote:
> Hey all -
>
> The Asterisk project just released a security advisory for a security
> vulnerability in which Asterisk using chan_sip with a proxy can allow for
> unauthenticated calls. This affects all supported versions of Asterisk (11,
> 13, 14). Since that may be relevant to those on this mailing list who are
> not also on the asterisk-users mailing list, I thought it prudent to
> mention it here as well.
>
> A description of the vulnerability follows:
>
> Description The chan_sip channel driver has a liberal definition for
> whitespace when attempting to strip the content between a
> SIP header name and a colon character. Rather than
> following RFC 3261 and stripping only spaces and horizontal
> tabs, Asterisk treats any non-printable ASCII character as
> if it were whitespace. This means that headers such as
>
> Contact\x01:
>
> will be seen as a valid Contact header.
>
> This mostly does not pose a problem until Asterisk is
> placed in tandem with an authenticating SIP proxy. In such
> a case, a crafty combination of valid and invalid To
> headers can cause a proxy to allow an INVITE request into
> Asterisk without authentication since it believes the
> request is an in-dialog request. However, because of the
> bug described above, the request will look like an
> out-of-dialog request to Asterisk. Asterisk will then
> process the request as a new call. The result is that
> Asterisk can process calls from unvetted sources without
> any authentication.
>
> If you do not use a proxy for authentication, then this
> issue does not affect you.
>
> If your proxy is dialog-aware (meaning that the proxy keeps
> track of what dialogs are currently valid), then this issue
> does not affect you.
>
> If you use chan_pjsip instead of chan_sip, then this issue
> does not affect you.
>
>
> The announcement can be seen here:
>
> http://lists.digium.com/pipermail/asterisk-announce/2016-December/000662.html
>
> Thanks again to Walter Doekes for reporting the vulnerability and providing
> the patch to fix it.
>
> Matt
>
>
>
> _______________________________________________
> SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
> sr-users at lists.sip-router.org
> http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users
>
More information about the sr-users
mailing list