Asterisk IAX2 远程内存破坏漏洞 CVE-2006-2898 CNNVD-200606-166

7.5 AV AC AU C I A
发布: 2006-06-07
修订: 2018-10-18

Asterisk是开放源码的软件PBX,支持各种VoIP协议和设备。 Asterisk的IAX消息解析的实现上存在内存破坏漏洞,远程攻击者可能利用此漏洞在服务器上执行任意指令。 IAX协议的所有通讯都依赖于4569/UDP端口。协议使用15位的标识号在同一UDP端口上多路传输几个IAX2流。IAX2消息被称为帧,Asterisk源码包的iax2.h头文件中定义了几个基本的帧类型。 IAX2完整帧使用如下的12字节首部: struct ast_iax2_full_hdr { unsigned short scallno; /*Source call number -- high bit must be 1*/ unsigned short dcallno; /*Destination call number -- high bit is 1 if retransmission */ unsigned int ts; /* 32-bit timestamp in milliseconds (from 1st transmission) */ unsigned char oseqno; /* Packet number (outgoing) */ unsigned char iseqno; /* Packet number (next incoming expected) */ unsigned char type; /* Frame type */ unsigned char csub; /* Compressed subclass */ unsigned char iedata[0]; } __attribute__ ((__packed__)); IAX2的mini-frame使用4字节的首部: struct ast_iax2_mini_hdr { unsigned short callno; /* Source call number -- high bit must be 0, rest must be non-zero */ unsigned short ts; /* 16-bit Timestamp (high 16 bits from last ast_iax2_full_hdr) */ /* Frametype implicitly...

0%
暂无可用Exp或PoC
当前有9条受影响产品信息