Posted: Wed Oct 10, 2007 5:02 pm Post subject: [asterisk-announce] AST-2007-022: Buffer overflows in voicem
Asterisk Project Security Advisory - AST-2007-022
+------------------------------------------------------------------------+
| Product | Asterisk |
|--------------------+---------------------------------------------------|
| Summary | Buffer overflows in voicemail when using IMAP |
| | storage |
|--------------------+---------------------------------------------------|
| Nature of Advisory | Remotely and locally exploitable buffer overflows |
|--------------------+---------------------------------------------------|
| Susceptibility | Remote Unauthenticated Sessions |
|--------------------+---------------------------------------------------|
| Severity | Minor |
|--------------------+---------------------------------------------------|
| Exploits Known | No |
|--------------------+---------------------------------------------------|
| Reported On | October 9, 2007 |
|--------------------+---------------------------------------------------|
| Reported By | Russell Bryant <russell@digium.com> |
| | |
| | Mark Michelson <mmichelson@digium.com> |
|--------------------+---------------------------------------------------|
| Posted On | October 9, 2007 |
|--------------------+---------------------------------------------------|
| Last Updated On | October 10, 2007 |
|--------------------+---------------------------------------------------|
| Advisory Contact | Mark Michelson <mmichelson@digium.com> |
|--------------------+---------------------------------------------------|
| CVE Name | |
+------------------------------------------------------------------------+
+------------------------------------------------------------------------+
| Description | The function "sprintf" was used heavily throughout the |
| | IMAP-specific voicemail code. After auditing the code, |
| | two vulnerabilities were discovered, both buffer |
| | overflows. |
| | |
| | The following buffer overflow required write access to |
| | Asterisk's configuration files in order to be exploited. |
| | |
| | 1) If a combination of the astspooldir (set in |
| | asterisk.conf), the voicemail context, and voicemail |
| | mailbox, were very long, then there was a buffer |
| | overflow when playing a message or forwarding a message |
| | (in the case of forwarding, the context and mailbox in |
| | question are the context and mailbox that the message |
| | was being forwarded to). |
| | |
| | The following buffer overflow could be exploited |
| | remotely. |
| | |
| | 2) If any one of, or any combination of the Content-type |
| | or Content-description headers for an e-mail that |
| | Asterisk recognized as a voicemail message contained |
| | more than a 1024 characters, then a buffer would |
| | overflow while listening to a voicemail message via a |
| | telephone. It is important to note that this did NOT |
| | affect users who get their voicemail via an e-mail |
| | client. |
+------------------------------------------------------------------------+
+------------------------------------------------------------------------+
| Resolution | "sprintf" calls have been changed to "snprintf" wherever |
| | space was not specifically allocated to the buffer prior |
| | to the sprintf call. This includes places which are not |
| | currently prone to buffer overflows. |
+------------------------------------------------------------------------+
+------------------------------------------------------------------------+
| Revision History |
|------------------------------------------------------------------------|
| Date | Editor | Revisions Made |
|--------------------+---------------------------+-----------------------|
| October 9, 2007 | mmichelson@digium.com | Initial Release |
+------------------------------------------------------------------------+
Asterisk Project Security Advisory - AST-2007-022
Copyright (c) 2007 Digium, Inc. All Rights Reserved.
Permission is hereby granted to distribute and publish this advisory in its
original, unaltered form.
_______________________________________________
--Bandwidth and Colocation Provided by http://www.api-digital.com--
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum