VOIP: Digium Asterisk Invalid RTP Payload Type Number Memory Corruption

This signature detects attempts to exploit a known vulnerability against Digium Asterisk. A successful attack can lead to arbitrary code execution.

Extended Description

Asterisk is prone to multiple buffer-overflow vulnerabilities because it fails to perform adequate boundary checks on user-supplied data before copying it to insufficiently sized buffers. Exploiting these issues may allow an attacker to corrupt memory and cause denial-of-service conditions or potentially execute arbitrary code in the context of the application. These issues affect the following versions: Asterisk Open Source prior to 1.4.18.1 and 1.4.19-rc3. Asterisk Open Source prior to 1.6.0-beta6 Asterisk Business Edition prior to C.1.6.1 AsteriskNOW prior to 1.0.2 Asterisk Appliance Developer Kit prior to Asterisk 1.4 revision 109386 s800i (Asterisk Appliance) prior to 1.1.0.2

Affected Products

Asterisk s800i_appliance,Asterisk asterisk

References

BugTraq: 28308

CVE: CVE-2008-1289

Short Name
VOIP:SIP:ASTERISK-RTP-TYPE
Severity
Major
Recommended
False
Recommended Action
Drop
Category
VOIP
Keywords
Asterisk CVE-2008-1289 Corruption Digium Invalid Memory Number Payload RTP Type bid:28308
Release Date
10/04/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Red_hat

Asterisk

CVSS Score

7.5

Found a potential security threat?