<div dir="ltr"><br><div class="gmail_quote">---------- Forwarded message ----------<br>From: <b class="gmail_sendername">Asterisk Security Team</b> <span dir="ltr">&lt;<a href="mailto:security@asterisk.org">security@asterisk.org</a>&gt;</span><br>Date: 2016-02-03 23:59 GMT-02:00<br>Subject: [asterisk-dev] AST-2016-002: File descriptor exhaustion in chan_sip<br>To: <a href="mailto:asterisk-dev@lists.digium.com">asterisk-dev@lists.digium.com</a><br><br><br>               Asterisk Project Security Advisory - AST-2016-002<br>
<br>
         Product        Asterisk<br>
         Summary        File descriptor exhaustion in chan_sip<br>
    Nature of Advisory  Denial of Service<br>
      Susceptibility    Remote Unauthenticated Sessions<br>
         Severity       Minor<br>
      Exploits Known    Yes<br>
       Reported On      September 17, 2015<br>
       Reported By      Alexander Traud<br>
        Posted On       February 3, 2016<br>
     Last Updated On    February 3, 2016<br>
     Advisory Contact   Richard Mudgett &lt;rmudgett AT digium DOT com&gt;<br>
         CVE Name       Pending<br>
<br>
    Description  Setting the sip.conf timert1 value to a value higher than<br>
                 1245 can cause an integer overflow and result in large<br>
                 retransmit timeout times. These large timeout values hold<br>
                 system file descriptors hostage and can cause the system to<br>
                 run out of file descriptors.<br>
<br>
    Resolution  Setting the sip.conf timert1 value to 1245 or lower will not<br>
                exhibit the vulnerability. The default timert1 value is 500.<br>
                Asterisk has been patched to detect the integer overflow and<br>
                calculate the previous retransmission timer value.<br>
<br>
                               Affected Versions<br>
                         Product                       Release<br>
                                                       Series<br>
                  Asterisk Open Source                  1.8.x   All versions<br>
                  Asterisk Open Source                  11.x    All versions<br>
                  Asterisk Open Source                  12.x    All versions<br>
                  Asterisk Open Source                  13.x    All versions<br>
                   Certified Asterisk                  1.8.28   All versions<br>
                   Certified Asterisk                   11.6    All versions<br>
                   Certified Asterisk                   13.1    All versions<br>
<br>
                                  Corrected In<br>
          Product                              Release<br>
    Asterisk Open Source                   11.21.1, 13.7.1<br>
     Certified Asterisk                11.6-cert12, 13.1-cert3<br>
<br>
                                      Patches<br>
                                 SVN URL                               Revision<br>
   <a href="http://downloads.asterisk.org/pub/security/AST-2016-002-1.8.28.diff" rel="noreferrer" target="_blank">http://downloads.asterisk.org/pub/security/AST-2016-002-1.8.28.diff</a> Certified<br>
                                                                       Asterisk<br>
                                                                       1.8.28<br>
   <a href="http://downloads.asterisk.org/pub/security/AST-2016-002-11.6.diff" rel="noreferrer" target="_blank">http://downloads.asterisk.org/pub/security/AST-2016-002-11.6.diff</a>   Certified<br>
                                                                       Asterisk<br>
                                                                       11.6<br>
   <a href="http://downloads.asterisk.org/pub/security/AST-2016-002-13.1.diff" rel="noreferrer" target="_blank">http://downloads.asterisk.org/pub/security/AST-2016-002-13.1.diff</a>   Certified<br>
                                                                       Asterisk<br>
                                                                       13.1<br>
   <a href="http://downloads.asterisk.org/pub/security/AST-2016-002-1.8.diff" rel="noreferrer" target="_blank">http://downloads.asterisk.org/pub/security/AST-2016-002-1.8.diff</a>    Asterisk<br>
                                                                       1.8<br>
   <a href="http://downloads.asterisk.org/pub/security/AST-2016-002-11.diff" rel="noreferrer" target="_blank">http://downloads.asterisk.org/pub/security/AST-2016-002-11.diff</a>     Asterisk<br>
                                                                       11<br>
   <a href="http://downloads.asterisk.org/pub/security/AST-2016-002-12.diff" rel="noreferrer" target="_blank">http://downloads.asterisk.org/pub/security/AST-2016-002-12.diff</a>     Asterisk<br>
                                                                       12<br>
   <a href="http://downloads.asterisk.org/pub/security/AST-2016-002-13.diff" rel="noreferrer" target="_blank">http://downloads.asterisk.org/pub/security/AST-2016-002-13.diff</a>     Asterisk<br>
                                                                       13<br>
<br>
    Links  <a href="https://issues.asterisk.org/jira/browse/ASTERISK-25397" rel="noreferrer" target="_blank">https://issues.asterisk.org/jira/browse/ASTERISK-25397</a><br>
<br>
    Asterisk Project Security Advisories are posted at<br>
    <a href="http://www.asterisk.org/security" rel="noreferrer" target="_blank">http://www.asterisk.org/security</a><br>
<br>
    This document may be superseded by later versions; if so, the latest<br>
    version will be posted at<br>
    <a href="http://downloads.digium.com/pub/security/AST-2016-002.pdf" rel="noreferrer" target="_blank">http://downloads.digium.com/pub/security/AST-2016-002.pdf</a> and<br>
    <a href="http://downloads.digium.com/pub/security/AST-2016-002.html" rel="noreferrer" target="_blank">http://downloads.digium.com/pub/security/AST-2016-002.html</a><br>
<br>
                                Revision History<br>
           Date             Editor                 Revisions Made<br>
    September 29, 2015  Richard Mudgett  Initial document created<br>
<br>
               Asterisk Project Security Advisory - AST-2016-002<br>
              Copyright (c) 2015 Digium, Inc. All Rights Reserved.<br>
  Permission is hereby granted to distribute and publish this advisory in its<br>
                           original, unaltered form.<br>
<span class="HOEnZb"><font color="#888888"><br>
<br>
--<br>
_____________________________________________________________________<br>
-- Bandwidth and Colocation Provided by <a href="http://www.api-digital.com" rel="noreferrer" target="_blank">http://www.api-digital.com</a> --<br>
<br>
asterisk-dev mailing list<br>
To UNSUBSCRIBE or update options visit:<br>
   <a href="http://lists.digium.com/mailman/listinfo/asterisk-dev" rel="noreferrer" target="_blank">http://lists.digium.com/mailman/listinfo/asterisk-dev</a><br>
</font></span></div><br><br clear="all"><div><br></div>-- <br><div class="gmail_signature"><div dir="ltr"><span style="font-family:trebuchet ms,sans-serif">Sylvio Jollenbeck</span><div><span style="font-family:trebuchet ms,sans-serif">skype: sylvio.jollenbeck<br><font size="1"><a href="http://www.hosannatecnologia.com.br/" target="_blank">www.hosannatecnologia.com.br</a></font></span><br><img src="http://www.hosannatecnologia.com.br/pixel.fw.png"><br></div></div></div>
</div>