[asterisk-bugs] [JIRA] (ASTERISK-20967) Security Vulnerability: DoS attack possible due to fix for CVE-2012-5976
Matt Jordan (JIRA)
noreply at issues.asterisk.org
Wed Mar 27 18:06:01 CDT 2013
[ https://issues.asterisk.org/jira/browse/ASTERISK-20967?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Matt Jordan updated ASTERISK-20967:
-----------------------------------
Component/s: (was: Channels/chan_sip/TCP-TLS)
Core/HTTP
> Security Vulnerability: DoS attack possible due to fix for CVE-2012-5976
> ------------------------------------------------------------------------
>
> Key: ASTERISK-20967
> URL: https://issues.asterisk.org/jira/browse/ASTERISK-20967
> Project: Asterisk
> Issue Type: Bug
> Components: Core/HTTP
> Affects Versions: 1.8.19.1, 1.8.20.0, 10.11.1, 10.11.1-digiumphones, 10.12.0, 10.12.0-digiumphones, 11.1.2, 11.2.0
> Reporter: Matt Jordan
> Target Release: 1.8.20.2, 10.12.2, 10.12.2-digiumphones, 11.2.2
>
> Attachments: AST-2013-002-10.diff, AST-2013-002-11.diff, AST-2013-002-1.8.diff, issueA20967_file_leak_and_unused_wkspace.patch
>
>
> {quote}
> When researching CVE-2012-5976 in HTTP, I came across a DoS possible on the patched versions of Asterisk. It is based on the user-controlled malloc(), which replaced the alloca() in http.c. An attacker can use the Content-length: header to control the amount of heap allocated and exhaust the memory available to Asterisk.
> I have attached our disclosure and a PoC for your convenience. The PoC uses a number of concurrent connections but with a bit more effort could probably use a probing scheme and then get away with one or very few connections. Also, note that filling up the memory is not necessary to effect a temporary DoS i.e. an attack would be possible over a low-bandwidth connection. The PoC does fill the buffer to demonstrate that the server process will be terminated by the OS in this case.
> Christoph Hebeisen
> {quote}
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: https://issues.asterisk.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira
More information about the asterisk-bugs
mailing list