This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.
The version of Asterisk running on the remote host may be affected
by multiple vulnerabilities.
According to the version in its SIP banner, the version of Asterisk
running on the remote host is potentially affected by the following
- An issue in the SIP protocol can lead to the enumeration
of endpoints with NAT settings different from the
default. Note that this is an issue with the SIP
protocol itself, and that updated versions of Asterisk
provide warnings and safer defaults. (AST-2011-013)
- A NULL pointer derefererence can lead to an application
crash by a remote, unauthenticated user when processing
a SIP request. Note that successful exploitation
requires that the 'automon' feature in features.conf be
enabled and that it is not by default. (AST-2011-014)
See also :
Either update to Asterisk 184.108.40.206 / 220.127.116.11 or later or disable the
'automon' feature in features.conf.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.6
Public Exploit Available : true
Nessus Plugin ID: 57289 ()
Bugtraq ID: 5098950990
CVE ID: CVE-2011-4597CVE-2011-4598
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.