Skip to content
Snippets Groups Projects
  • Matthew Jordan's avatar
    ccbe965e
    AST-2013-002: Prevent denial of service in HTTP server · ccbe965e
    Matthew Jordan authored
    AST-2012-014, fixed in January of this year, contained a fix for Asterisk's
    HTTP server for a remotely-triggered crash. While the fix put in place fixed
    the possibility for the crash to be triggered, a denial of service vector still
    exists with that solution if an attacker sends one or more HTTP POST requests
    with very large Content-Length values. This patch resolves this by capping
    the Content-Length at 1024 bytes. Any attempt to send an HTTP POST with
    Content-Length greater than this cap will not result in any memory allocation.
    The POST will be responded to with an HTTP 413 "Request Entity Too Large"
    response.
    
    This issue was reported by Christoph Hebeisen of TELUS Security Labs
    
    (closes issue ASTERISK-20967)
    Reported by: Christoph Hebeisen
    patches:
      AST-2013-002-1.8.diff uploaded by mmichelson (License 5049)
      AST-2013-002-10.diff uploaded by mmichelson (License 5049)
      AST-2013-002-11.diff uploaded by mmichelson (License 5049)
    
    
    git-svn-id: https://origsvn.digium.com/svn/asterisk/branches/11@383978 65c4cc65-6c06-0410-ace0-fbb531ad65f3
    ccbe965e
    History
    AST-2013-002: Prevent denial of service in HTTP server
    Matthew Jordan authored
    AST-2012-014, fixed in January of this year, contained a fix for Asterisk's
    HTTP server for a remotely-triggered crash. While the fix put in place fixed
    the possibility for the crash to be triggered, a denial of service vector still
    exists with that solution if an attacker sends one or more HTTP POST requests
    with very large Content-Length values. This patch resolves this by capping
    the Content-Length at 1024 bytes. Any attempt to send an HTTP POST with
    Content-Length greater than this cap will not result in any memory allocation.
    The POST will be responded to with an HTTP 413 "Request Entity Too Large"
    response.
    
    This issue was reported by Christoph Hebeisen of TELUS Security Labs
    
    (closes issue ASTERISK-20967)
    Reported by: Christoph Hebeisen
    patches:
      AST-2013-002-1.8.diff uploaded by mmichelson (License 5049)
      AST-2013-002-10.diff uploaded by mmichelson (License 5049)
      AST-2013-002-11.diff uploaded by mmichelson (License 5049)
    
    
    git-svn-id: https://origsvn.digium.com/svn/asterisk/branches/11@383978 65c4cc65-6c06-0410-ace0-fbb531ad65f3