Asterisk SIP Channel Driver Uninitialized Variable Request Parsing DoS (AST-2011-012)

This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.


Synopsis :

A telephony application running on the remote host is affected by a
denial of service vulnerability.

Description :

According to the version in its SIP banner, the version of Asterisk
running on the remote host can be crashed remotely by an authenticated
user when parsing an invalid SIP URI.

See also :

http://downloads.asterisk.org/pub/security/AST-2011-012.html

Solution :

Update to Asterisk 1.8.7.1 / 10.0.0-rc1 or later.

Risk factor :

Medium / CVSS Base Score : 4.0
(CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P)
CVSS Temporal Score : 3.0
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Denial of Service

Nessus Plugin ID: 56922 ()

Bugtraq ID: 50177

CVE ID: CVE-2011-4063

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now