This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.
The version of Asterisk running on the remote host may be affected
by a denial of service vulnerability.
According to the version in its SIP banner, the version of Asterisk
running on the remote host can be crashed remotely by an authenticated
user when parsing an invalid SIP URI.
See also :
Update to Asterisk 220.127.116.11 / 10.0.0-rc1 or later.
Risk factor :
Medium / CVSS Base Score : 4.0
CVSS Temporal Score : 3.0
Public Exploit Available : false
Family: Denial of Service
Nessus Plugin ID: 56922 ()
Bugtraq ID: 50177
CVE ID: CVE-2011-4063
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.