VOIP: SIP T.38 SDP Overflow
This signature detects attempts to exploit a known vulnerability in Asterisk SIP Server. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.
Extended Description
Asterisk is prone to multiple remote stack-based buffer-overflow vulnerabilities because it fails to perform adequate boundary checks on user-supplied data before copying it to insufficiently sized buffers. Successful exploits may allow an attacker to execute arbitrary machine code to compromise an affected computer or to cause denial-of-service conditions. Versions prior to Asterisk Open Source 1.4.3, AsteriskNOW Beta 6, and Asterisk Appliance Developer Kit 0.4.0 are vulnerable. NOTE: These issues occur only when 't38 fax over SIP' is enabled in 'sip.conf'.
Affected Products
Asterisk asterisk
References
BugTraq: 23648
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Asterisk