[asterisk-bugs] [JIRA] (ASTERISK-27013) res_rtp_asterisk: Media can be hijacked even with strict RTP enabled
Matthew Fredrickson (JIRA)
noreply at issues.asterisk.org
Fri Sep 1 14:45:10 CDT 2017
[ https://issues.asterisk.org/jira/browse/ASTERISK-27013?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Matthew Fredrickson updated ASTERISK-27013:
-------------------------------------------
Target Release Version/s: 15.0.0
> res_rtp_asterisk: Media can be hijacked even with strict RTP enabled
> --------------------------------------------------------------------
>
> Key: ASTERISK-27013
> URL: https://issues.asterisk.org/jira/browse/ASTERISK-27013
> Project: Asterisk
> Issue Type: Bug
> Components: Resources/res_rtp_asterisk
> Affects Versions: 13.15.0, 14.4.0
> Reporter: Joshua Colp
> Assignee: Joshua Colp
> Target Release: 11.25.2, 13.17.1, 14.6.1, 15.0.0
>
>
> the commit https://github.com/asterisk/asterisk/commit/80b8c2349c427a94a428670f1183bdc693936813 has made asterisk vulnerable again for RTP/RTCP scanning/stealing/injection attacks (when NAT support is enabled). Version 11.0.4 was the first release to include this, all following versions have this issue (last tested against 14.4.0).
> How to reproduce:
> - set up a SIP friend with NAT support enabled
> - make a call with that SIP peer (i use a minimalistic Playback extension)
> - use rtpnatscan from a remote system (https://github.com/kapejod/rtpnatscan) to scan Asterisk's RTP port range (rtpnatscan will report received RTP packets "received X bytes from target port Y, seq Z")
> Impact:
> - denial of service (with minimal bandwidth requirements)
> - information leakage
> This is what Sandro Gauci has been talking about in his presentation at Kamailio World 2017.
--
This message was sent by Atlassian JIRA
(v6.2#6252)
More information about the asterisk-bugs
mailing list