Asterisk SIP Channel Driver Uninitialized Variable Request Parsing DoS (AST-2011-012)

This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.


Synopsis :

The version of Asterisk running on the remote host may be affected
by a denial of service vulnerability.

Description :

According to the version in its SIP banner, the version of Asterisk
running on the remote host can be crashed remotely by an authenticated
user when parsing an invalid SIP URI.

See also :

http://downloads.asterisk.org/pub/security/AST-2011-012.html

Solution :

Update to Asterisk 1.8.7.1 / 10.0.0-rc1 or later.

Risk factor :

Medium / CVSS Base Score : 4.0
(CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P)
CVSS Temporal Score : 3.0
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Denial of Service

Nessus Plugin ID: 56922 ()

Bugtraq ID: 50177

CVE ID: CVE-2011-4063

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial