This script is Copyright (C) 2011-2015 Tenable Network Security, Inc.
The remote Fedora host is missing a security update.
The Asterisk Development Team has announced security releases for
Asterisk branches 1.6.1, 1.6.2, and 1.8. The available security
releases are released as versions 188.8.131.52, 184.108.40.206.2, and 220.127.116.11.
These releases are available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/releases ** This
is a re-release of Asterisk 18.104.22.168, 22.214.171.124.1 and 126.96.36.199 which
contained a bug which caused duplicate manager entries (issue #18987).
The releases of Asterisk 188.8.131.52, 184.108.40.206.2, and 220.127.116.11 resolve two
- Resource exhaustion in Asterisk Manager Interface
- Remote crash vulnerability in TCP/TLS server
(AST-2011-004) The issues and resolutions are
described in the AST-2011-003 and AST-2011-004
security advisories. For more information about the
details of these vulnerabilities, please read the
security advisories AST-2011-003 and AST-2011-004,
which were released at the same time as this
announcement. For a full list of changes in the
current releases, please see the ChangeLog:
eleases/ChangeLog-18.104.22.168 Security advisory
AST-2011-003 and AST-2011-004 are available at:
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
See also :
Update the affected asterisk package.
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 3.7
Public Exploit Available : false
Family: Fedora Local Security Checks
Nessus Plugin ID: 53243 ()
Bugtraq ID: 4689746898
CVE ID: CVE-2011-1174CVE-2011-1175
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.