Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

VOIP:SIP:ASTERISK-RTP-TYPE

Severity

High

Recommended

No

Recommended Action

Drop

Category

VOIP

Keywords

Digium Asterisk Invalid RTP Payload Type Number Memory Corruption

Release Date

2010/10/04

Update Number

1784

Supported Platforms

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

VOIP: Digium Asterisk Invalid RTP Payload Type Number Memory Corruption


This signature detects attempts to exploit a known vulnerability against Digium Asterisk. A successful attack can lead to arbitrary code execution.

Extended Description

Asterisk is prone to multiple buffer-overflow vulnerabilities because it fails to perform adequate boundary checks on user-supplied data before copying it to insufficiently sized buffers. Exploiting these issues may allow an attacker to corrupt memory and cause denial-of-service conditions or potentially execute arbitrary code in the context of the application. These issues affect the following versions: Asterisk Open Source prior to 1.4.18.1 and 1.4.19-rc3. Asterisk Open Source prior to 1.6.0-beta6 Asterisk Business Edition prior to C.1.6.1 AsteriskNOW prior to 1.0.2 Asterisk Appliance Developer Kit prior to Asterisk 1.4 revision 109386 s800i (Asterisk Appliance) prior to 1.1.0.2

Affected Products

  • Asterisk 1.4.1
  • Asterisk 1.4.10
  • Asterisk 1.4.11
  • Asterisk 1.4.12
  • Asterisk 1.4.13
  • Asterisk 1.4.14
  • Asterisk 1.4.15
  • Asterisk 1.4.16
  • Asterisk 1.4.17
  • Asterisk 1.4.2
  • Asterisk 1.4.3
  • Asterisk 1.4.4
  • Asterisk 1.4.5
  • Asterisk 1.4.6
  • Asterisk 1.4.7
  • Asterisk 1.4.8
  • Asterisk 1.4.9
  • Asterisk 1.4 Beta
  • Asterisk 1.4 Revision 95946
  • Asterisk Asterisk Appliance Developer Kit 1.4
  • Asterisk Asterisk Business Edition C.1.0-beta7
  • Asterisk Asterisk Business Edition C.1.0-beta8
  • Asterisk AsteriskNow 1.0
  • Asterisk s800i Appliance 1.1.0.0
  • Red Hat Fedora 7
  • Red Hat Fedora 8

References

  • BugTraq: 28308
  • CVE: CVE-2008-1289

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out