TUCoPS :: Phreaking General Information :: tb13042.htm

Nortel IP Phone forced re-authentication
Nortel IP Phone forced re-authentication
Nortel IP Phone forced re-authentication



#############################################################=0D
#=0D
# COMPASS SECURITY ADVISORY http://www.csnc.ch/=0D 
#=0D
#############################################################=0D
#=0D
# Product: IP Phone=0D
# Vendor:  Nortel=0D
# Subject: IP Phone forced re-authentication=0D
# Risk:    High=0D
# Effect:  Currently exploitable=0D
# Author:  Daniel Stirnimann (daniel.stirnimann (at) csnc (dot) ch)=0D
# Date:    October, 18th 2007=0D
#=0D
#############################################################=0D
=0D
Introduction:=0D
-------------=0D
The UNIStim signalisation protocol is vulnerable against spoofed re-authentication messages. A malicious user can send spoofed registration messages to the server to which a UNIStim IP phone is connected. This can force the legitimate IP phone into a situation where it must re-register=0D
with the server to maintain service. A continuous stream of these messages prevents the IP phone from properly registering.=0D
=0D
Nortel has noted this as:=0D
Title:  DoS Potential Vulnerability - UNIStim IP Phone Forced to Re-register=0D
Number: 2007008385=0D
http://support.nortel.com/go/main.jsp?cscat=SECUREADVISORY=0D 
=0D
Vulnerable:=0D
-----------=0D
Nortel IP Phone 1140E=0D
IP Softphone 2050=0D
and others.=0D
=0D
See associated products on the Nortel advisory.=0D
=0D
Vulnerability Management:=0D
-------------------------=0D
June 2007:    Vulnerability found=0D
June 2007:    Nortel Security notified=0D
October 2007: Nortel Advisory & Patches available=0D
October 2007: Compass Security Information=0D
=0D
Remediation:=0D
------------=0D
Follow the recommended actions for the affected systems, as identified in the Nortel Advisory.=0D
=0D
Technical Description:=0D
----------------------=0D
A malicious user can send a resume message to the signaling server to which an IP phone is connected. The resume message is a UNIStim UDP datagram. In order for the signaling server to detect which IP phone wants to resume the=0D
connection it reads the source IP address from the UDP datagram to identify the client. That means we can send a spoofed resume UNIStim UDP datagram.=0D
=0D
The server sends the new sequence number back to the IP phone. However, because we spoofed the above message, we don't see the response. The effect is that, the IP phone is out of sync with the server. During this time, the IP phone can not take on or make any calls. As soon as the IP phone realizes that it is out of sync (watchdog timeout=0D
expired) it will re-authenticate against the signaling server. Note that if the malicious user continues to send spoofed resume messages=0D
the hard phone will not be able to go online.=0D
=0D
Reference:=0D
http://www.csnc.ch/static/advisory/secadvisorylist.html 

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH