This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.
A telephony application running on the remote host is affected by a
buffer overflow vulnerability.
Using a specially crafted caller ID string, an authenticated user
placing an outgoing call through the remote Asterisk server can cause
a buffer overflow leading to an application crash or execution of
Successful exploitation may require that the SIP channel driver is
configured with the 'pedantic' option enabled.
See also :
Upgrade to Asterisk 220.127.116.11 / 18.104.22.168 / 22.214.171.124 / 126.96.36.199.1 /
188.8.131.52.1 / 184.108.40.206 / 220.127.116.11, Asterisk Business Edition C.3.6.2 or
Risk factor :
Medium / CVSS Base Score : 6.5
CVSS Temporal Score : 5.7
Public Exploit Available : false