Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 141551 - net-misc/asterisk IAX2 DoS Vulnerability
Summary: net-misc/asterisk IAX2 DoS Vulnerability
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: http://www.asterisk.org/node/99
Whiteboard: B3 [] jaervosz
Keywords:
Depends on: 144941
Blocks:
  Show dependency tree
 
Reported: 2006-07-24 00:07 UTC by Sune Kloppenborg Jeppesen (RETIRED)
Modified: 2006-11-16 06:28 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-07-24 00:07:50 UTC
Recently, ISS posted a report about a Denial of Service vulnerability in Asterisk's IAX2 implementation. This vulnerability exists in all existing IAX2 implementations that accept incoming calls (not just Asterisk), and relates to the amount of time that a pending (but not yet authenticated) call is allowed to exist in memory on the server.
In response to this report, we recently released Asterisk 1.2.10, which provides a configuration option that the administrator can use to combat this activity. This option is called 'maxauthreq' and is available at the global level and for type=user entries in iax.conf (it is not needed for type=peer entries, since peers cannot place calls into the Asterisk server). Since this is a release branch of Asterisk, we were not comfortable changing the default behavior, so this new option defaults to zero, which means there is no limit in place.
We urge all users with Asterisk servers connected to public (or otherwise uncontrolled) networks to upgrade to Asterisk 1.2.10 and set this configuration option to a reasonable value; for most IAX2 user accounts a value of three will be more than adequate. If the user attempts to place more calls than are allowed without providing authentication information for some of them, the additional requests will be denied without requesting authentication information and without preserving the call information in memory for the normal period of time.
Comment 1 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-07-24 00:08:43 UTC
voip please advise and provide an updated ebuild.
Comment 2 Thierry Carrez (RETIRED) gentoo-dev 2006-08-12 05:28:24 UTC
voip, please bump to 1.2.10
Comment 3 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-09-13 23:24:21 UTC
Handling stable marking of 1.2.11 on bug #144941
Comment 4 Alin Năstac (RETIRED) gentoo-dev 2006-11-02 07:17:02 UTC
Isn't this bug imbrincated in bug 144941 ? If so, shouldn't it be closed?
Comment 5 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-11-16 06:28:53 UTC
You're right Alin this was covered by GLSA 200610-15.