Asterisk Multiple Vulnerabilities (AST-2011-013 / AST-2011-014)

This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.

Synopsis :

The version of Asterisk running on the remote host may be affected
by multiple vulnerabilities.

Description :

According to the version in its SIP banner, the version of Asterisk
running on the remote host is potentially affected by the following
vulnerabilities :

- An issue in the SIP protocol can lead to the enumeration
of endpoints with NAT settings different from the
default. Note that this is an issue with the SIP
protocol itself, and that updated versions of Asterisk
provide warnings and safer defaults. (AST-2011-013)

- A NULL pointer derefererence can lead to an application
crash by a remote, unauthenticated user when processing
a SIP request. Note that successful exploitation
requires that the 'automon' feature in features.conf be
enabled and that it is not by default. (AST-2011-014)

See also :

Solution :

Either update to Asterisk / or later or disable the
'automon' feature in features.conf.

Risk factor :

Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.6
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 57289 ()

Bugtraq ID: 50989

CVE ID: CVE-2011-4597

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial