Giuseppe Iuculano
2009-Aug-14 08:51 UTC
[Secure-testing-team] Bug#541441: CVE-2009-2726: Asterisk SIP Channel Driver Denial of Service
Package: asterisk Severity: serious Tags: security -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for asterisk. CVE-2009-2726[0]: | The SIP channel driver in Asterisk Open Source 1.2.x before 1.2.34, | 1.4.x before 1.4.26.1, 1.6.0.x before 1.6.0.12, and 1.6.1.x before | 1.6.1.4; Asterisk Business Edition A.x.x, B.x.x before B.2.5.9, C.2.x | before C.2.4.1, and C.3.x before C.3.1; and Asterisk Appliance s800i | 1.2.x before 1.3.0.3 does not use a maximum width when invoking sscanf | style functions, which allows remote attackers to cause a denial of | service (stack memory consumption) via SIP packets containing large | sequences of ASCII decimal characters, as demonstrated via vectors | related to (1) the CSeq value in a SIP header, (2) large | Content-Length value, and (3) SDP. If you fix the vulnerability please also make sure to include the CVE id in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2726 http://security-tracker.debian.net/tracker/CVE-2009-2726 Cheers, Giuseppe -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkqFJagACgkQNxpp46476aqfQgCfZWL0q6UVuBA6xoRE/GwoxYhX dEYAnigAWnQbYF0SS/n+nZXcweMCdRx1 =gCe6 -----END PGP SIGNATURE-----