VOIP: SIP T.38 SDP Overflow

This signature detects attempts to exploit a known vulnerability in Asterisk SIP Server. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Extended Description

Asterisk is prone to multiple remote stack-based buffer-overflow vulnerabilities because it fails to perform adequate boundary checks on user-supplied data before copying it to insufficiently sized buffers. Successful exploits may allow an attacker to execute arbitrary machine code to compromise an affected computer or to cause denial-of-service conditions. Versions prior to Asterisk Open Source 1.4.3, AsteriskNOW Beta 6, and Asterisk Appliance Developer Kit 0.4.0 are vulnerable. NOTE: These issues occur only when 't38 fax over SIP' is enabled in 'sip.conf'.

Affected Products

Asterisk asterisk

References

BugTraq: 23648

Short Name
VOIP:SIP:OVERFLOW:T-38-SDP-OF
Severity
Major
Recommended
False
Recommended Action
None
Category
VOIP
Keywords
Overflow SDP SIP T.38 bid:23648
Release Date
11/21/2007
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Asterisk

Found a potential security threat?