[Home]

Summary:ASTERISK-01702: SECURITY: remotely exploitable heap overflow in Asterisk
Reporter:fonetikli (fonetikli)Labels:
Date Opened:2004-05-26 18:25:51Date Closed:2008-01-15 14:56:27.000-0600
Priority:MajorRegression?No
Status:Closed/CompleteComponents:Core/General
Versions:Frequency of
Occurrence
Related
Issues:
Environment:Attachments:
Description:Only tested against v0.9.0
Have working remote root exploit.
Only effects those using skinny protocol

****** ADDITIONAL INFORMATION ******

Problem exists in chan_skinny.c
in function get_input():

res = read(s->fd, s->inbuf+4, dlen+4);

dlen is read directly from user supplied data at beginning of packet, and never validated for arbitrarily large (or negative) values.

please credit jonny@prophecy.net.nz in any advisories for this bug - thanks :)
Comments:By: Mark Spencer (markster) 2004-05-26 19:03:16

Fixed in CVS.  I've never heard of a heap bug being exploitable.

By: fonetikli (fonetikli) 2004-05-27 02:55:23

Reminder sent to markster

In that case suggest you read:
http://www.w00w00.org/files/articles/heaptut.txt

Do any of the major linux vendors include Asterisk as part of their distribution?  If so, they really need to be notified on this one.


By: Digium Subversion (svnbot) 2008-01-15 14:56:27.000-0600

Repository: asterisk
Revision: 3085

U   trunk/channels/chan_skinny.c

------------------------------------------------------------------------
r3085 | markster | 2008-01-15 14:56:26 -0600 (Tue, 15 Jan 2008) | 2 lines

Perform proper heap bounds checking on skinny messages (bug ASTERISK-1702)

------------------------------------------------------------------------

http://svn.digium.com/view/asterisk?view=rev&revision=3085