Bug 1404038 (CVE-2016-9938) - CVE-2016-9938 asterisk: Authentication Bypass due to improper content stripping
Summary: CVE-2016-9938 asterisk: Authentication Bypass due to improper content stripping
Keywords:
Status: CLOSED UPSTREAM
Alias: CVE-2016-9938
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1404039 1404040
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-12-12 22:53 UTC by Adam Mariš
Modified: 2021-02-17 02:53 UTC (History)
4 users (show)

Fixed In Version: asterisk 11.25.1, asterisk 13.13.1, asterisk 14.2.1
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2019-06-08 03:04:16 UTC
Embargoed:


Attachments (Terms of Use)

Description Adam Mariš 2016-12-12 22:53:35 UTC
The chan_sip channel driver has a liberal definition for whitespace when attempting to strip the content between a SIP header name and a colon character. Rather than following RFC 3261 and stripping only spaces and horizontal tabs, Asterisk treats any non-printable ASCII character as if it were whitespace. This means that headers such as

Contact\x01:

will be seen as a valid Contact header.

This mostly does not pose a problem until Asterisk is placed in tandem with an authenticating SIP proxy. In such a case, a crafty combination of valid and invalid To headers can cause a proxy to allow an INVITE request into Asterisk without authentication since it believes the request is an in-dialog request. However, because of the bug described above, the request will look like an out-of-dialog request to Asterisk. Asterisk will then process the request as a new call. The result is that Asterisk can process calls from unvetted sources without any authentication.

If you do not use a proxy for authentication, then this issue does not affect you.

If your proxy is dialog-aware (meaning that the proxy keeps track of what dialogs are currently valid), then this issue does not affect you.

If you use chan_pjsip instead of chan_sip, then this issue does not affect you.

External Reference:

http://downloads.asterisk.org/pub/security/AST-2016-009.html

Comment 1 Adam Mariš 2016-12-12 22:54:47 UTC
Created asterisk tracking bugs for this issue:

Affects: fedora-all [bug 1404039]
Affects: epel-6 [bug 1404040]

Comment 2 Product Security DevOps Team 2019-06-08 03:04:16 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.


Note You need to log in before you can comment on or make changes to this bug.