翻訳と辞書 |
INVITE of Death : ウィキペディア英語版 | INVITE of Death
An INVITE of Death is a type of attack on a VoIP-system that involves sending a malformed or otherwise malicious SIP INVITE request to a telephony server, resulting in a crash of that server. Because telephony is usually a critical application, this damage causes significant disruption to the users and poses tremendous acceptance problems with VoIP. These kinds of attacks do not necessarily affect only SIP-based systems; all implementations with vulnerabilities in the VoIP area are affected. The DoS attack can also be transported in other messages than INVITE. For example, in December 2007 there was a report about a vulnerability in the BYE message ("BYE BYE") by using an obsolete header with the name "Also".〔http://blog.tmcnet.com/blog/tom-keating/asterisk/asterisk-security-vulnerability-in-sip-channel-driver.asp〕 However, sending INVITE packets is the most popular way of attacking telephony systems.〔http://www.fiercevoip.com/story/invite-death-sip-digest-attack-ring-voip-security-alarms/2009-03-13?cmp-id=OTC-RSS-FV0〕 The name is a reference to the ping of death attack that caused serious trouble in 1995-1997. ==VoIP Servers (INVITE of Death)== The INVITE of Death vulnerability was found 〔http://opensbc.blogspot.be/2012/11/opensbc-invite-of-death.html〕 on February 16, 2009.〔http://muhammadakbar.com/files/globecom09-zubair.pdf〕 The vulnerability allows the attacker to crash the server causing remote Denial of Service (DoS) by sending a single malformed packet. An impersonator can, using a malformed packet, overflow the specific string buffers, add a large number of token characters, and modify fields in an illegal fashion. As a result, a server is tricked into an undefined state, which can lead to call processing delays, unauthorized access, and a complete denial of service. The problem specifically exists in OpenSBC version 1.1.5-25 in the handling of the “Via” field from a maliciously crafted SIP packet.〔http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5426247&tag=1〕 The INVITE of Death packet is also used in finding a new vulnerability in the patched OpenSBC server through network dialog minimization. 〔http://zubairrafique.wordpress.com/2014/09/30/invite-of-death-and-network-dialog-minimization-new-vulnerability-in-voip-server/〕 〔http://osvdb.net/show/osvdb/86607〕 For the popular, open source-based Asterisk PBX there are security advisories that cover not only signaling-related problems, but also problems with other protocols and their resolution.〔http://www.asterisk.org/security〕 Problems may be malformed SDP attachments where codex numbers are out of the valid range or obsolete headers such as “Also”. The INVITE of Death is specifically a problem for operators that run their servers on the public internet. Because SIP allows the usage of UDP packets, it is easy for an attacker to spoof any source address in the internet and send the INVITE of death from untraceable locations. By sending these kinds of requests periodically, attackers can completely interrupt the telephony service. The only choice for the service provider is to upgrade their systems until the attack does not crash the system anymore.
抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)』 ■ウィキペディアで「INVITE of Death」の詳細全文を読む
スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース |
Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.
|
|