brian at freeswitch.com
Tue Aug 25 17:06:39 UTC 2020
Spoke with Steve,
What is described there does not appear to be a problem with the FAX
protocol, even though the text says it is. They refer to problems
handling DHT (define huffman table) and COM (comment) sections when they
are used incorrectly. Those are tags in JPEG images. It looks like that
are talking about an issue with JPEG decoders that don't allow for
certain types of corrupt image, and the exploit would be specific to
particular models of FAX machines. The problem would be in the JPEG
decoder itself. Spandsp calls the system's JPEG library to do that
decoding. Any flaw that might exist would be in that system's JPEG library.
On Mon, Aug 24, 2020 at 4:14 AM mayamatakeshi <mayamatakeshi at gmail.com>
> *Check Point researchers have discovered a vulnerability in the ITU T.30
> fax protocol that could be hacked to launch a cyberattack and gain access
> to a network.*
> The phrase above indicates a flaw in the T.30 protocol itself and not in
> particular implementations.
> This is from 2018.
> I don't remember reading anything about this in the fs mailing list.
> Was freeswitch/spandsp audited to ensure application rxfax is safe?
> The FreeSWITCH project is sponsored by SignalWire https://signalwire.com
> Enhance your FreeSWITCH install with disruptive priced SMS and PSTN
> Build your next product on our scalable cloud platform.
> Join our online community to chat in real time
> Professional FreeSWITCH Services
> sales at freeswitch.com
> Official FreeSWITCH Sites
> FreeSWITCH-users mailing list
> FreeSWITCH-users at lists.freeswitch.org
Brian West | Co-founder and Developer
Need Commercial support? email sales at freeswitch.com
FreeSWITCH Solutions | 17345 Civic Drive #2531 Brookfield, WI 53045
Email: brian at freeswitch.com
Website: https://www.FreeSWITCH.com <https://www.freeswitch.com/>
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the FreeSWITCH-users