Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email hr@neohapsis.com
AST-2013-005: Remote Crash when Invalid SDP is sent in SIP Request

From: Asterisk Security Team (securityasterisk.org)
Date: Tue Aug 27 2013 - 19:26:17 CDT

               Asterisk Project Security Advisory - AST-2013-005

         Product Asterisk
         Summary Remote Crash when Invalid SDP is sent in SIP Request
    Nature of Advisory Remote Crash
      Susceptibility Remote Unauthenticated Sessions
         Severity Major
      Exploits Known None
       Reported On July 03, 2013
       Reported By Walter Doekes, OSSO B.V.
        Posted On August 27, 2013
     Last Updated On August 27, 2013
     Advisory Contact Matthew Jordan <mjordan AT digium DOT com>
         CVE Name Pending

    Description A remotely exploitable crash vulnerability exists in the
                 SIP channel driver if an invalid SDP is sent in a SIP
                 request that defines media descriptions before connection
                 information. The handling code incorrectly attempts to
                 reference the socket address information even though that
                 information has not yet been set.

    Resolution This patch adds checks when handling the various media
                descriptions that ensures the media descriptions are handled
                only if we have connection information suitable for that
                Thanks to Walter Doekes of OSSO B.V. for finding, reporting,
                testing, and providing the fix for this problem.

                               Affected Versions
                 Product Release Series
          Asterisk Open Source 1.8.x All Versions
          Asterisk Open Source 10.x All Versions
          Asterisk Open Source 11.x All Versions
           Certified Asterisk 1.8.15 All Versions
           Certified Asterisk 11.2 All Versions
       Asterisk with Digiumphones 10.x-digiumphones All Versions

                                  Corrected In
                  Product Release
            Asterisk Open Source, 10.12.3, 11.5.1
             Certified Asterisk 1.8.15-cert3, 11.2-cert2
         Asterisk with Digiumphones 10.12.3-digiumphones

                                  SVN URL Revision
http://downloads.asterisk.org/pub/security/AST-2013-005-1.8.diff Asterisk 1.8
http://downloads.asterisk.org/pub/security/AST-2013-005-10.diff Asterisk 10
http://downloads.asterisk.org/pub/security/AST-2013-005-10-digiumphones.diff Asterisk
http://downloads.asterisk.org/pub/security/AST-2013-005-11.diff Asterisk 11
http://downloads.asterisk.org/pub/security/AST-2013-005-1.8.15.diff Certified
                                                                             Asterisk 1.8.15
http://downloads.asterisk.org/pub/security/AST-2013-005-11.2.diff Certified
                                                                             Asterisk 11.2

       Links https://issues.asterisk.org/jira/browse/ASTERISK-22007

    Asterisk Project Security Advisories are posted at
    This document may be superseded by later versions; if so, the latest
    version will be posted at
    http://downloads.digium.com/pub/security/AST-2013-005.pdf and

                                Revision History
          Date Editor Revisions Made
    2013-08-27 Matt Jordan Initial Revision

               Asterisk Project Security Advisory - AST-2013-005
              Copyright (c) 2013 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.