漏洞标题
N/A
漏洞描述信息
在Aterisk Open Source 11.x在11.25.1之前,13.x在13.13.1之前,14.x在14.2.1之前以及 Certified Asterisk 11.x在11.6-cert16之前和13.x在13.8-cert4之前发现一个问题。chan_sip channel driver 在尝试去掉SIP header name和横线字符之间的内容时对空格的宽松定义。Aterisk 不是按照 RFC 3261 只删除空格和水平横线,而是将任何非打印的 ASCII 字符视为空格。这意味着,如 Contact\x01: 这样的头将被视为有效的 Contact 头。这主要问题不大,直到 Aterisk 与验证的 SIP 代理协同工作为止。在这种情况下,具有有效和无效 To 头的复杂组合可能导致代理允许 Aterisk 接受 INVITE 请求而无需验证,因为它认为该请求是对话请求。然而,由于上述 bug,请求将看起来像是 Aterisk 对外的对话请求。Aterisk 然后将将其作为新呼叫进行处理。结果是,Aterisk 可以从未经验证的来源处理呼叫而不需要进行验证。如果你不使用代理进行验证,那么这个问题对你不会造成影响。如果你的代理具有对话感知(意味着代理跟踪哪些对话是有效的),那么这个问题对你不会造成影响。如果你使用 chan_pjsip 而不是 chan_sip,那么这个问题对你不会造成影响。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
漏洞类别
N/A
漏洞标题
N/A
漏洞描述信息
An issue was discovered in Asterisk Open Source 11.x before 11.25.1, 13.x before 13.13.1, and 14.x before 14.2.1 and Certified Asterisk 11.x before 11.6-cert16 and 13.x before 13.8-cert4. The chan_sip channel driver has a liberal definition for whitespace when attempting to strip the content between a SIP header name and a colon character. Rather than following RFC 3261 and stripping only spaces and horizontal tabs, Asterisk treats any non-printable ASCII character as if it were whitespace. This means that headers such as Contact\x01: will be seen as a valid Contact header. This mostly does not pose a problem until Asterisk is placed in tandem with an authenticating SIP proxy. In such a case, a crafty combination of valid and invalid To headers can cause a proxy to allow an INVITE request into Asterisk without authentication since it believes the request is an in-dialog request. However, because of the bug described above, the request will look like an out-of-dialog request to Asterisk. Asterisk will then process the request as a new call. The result is that Asterisk can process calls from unvetted sources without any authentication. If you do not use a proxy for authentication, then this issue does not affect you. If your proxy is dialog-aware (meaning that the proxy keeps track of what dialogs are currently valid), then this issue does not affect you. If you use chan_pjsip instead of chan_sip, then this issue does not affect you.
CVSS信息
N/A
漏洞类别
N/A
漏洞标题
Digium Asterisk Open Source 安全漏洞
漏洞描述信息
Digium Asterisk Open Source是美国Digium公司的一套开源的电话交换机(PBX)系统软件。该软件支持语音信箱、多方语音会议、交互式语音应答(IVR)等。 Digium Asterisk Open Source中存在安全漏洞。攻击者可利用该漏洞执行未授权的操作。
CVSS信息
N/A
漏洞类别
其他