Asterisk SIP Channel Driver Username Disclosure (AST-2013-003)

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.


Synopsis :

The version of Asterisk installed on the remote host may be affected by
an information disclosure vulnerability.

Description :

According to the version in its SIP banner, the version of Asterisk
running on the remote host is potentially affected by a username
disclosure vulnerability related to INVITE, SUBSCRIBE and REGISTER
transactions and improper settings for the configuration options
'alwaysauthreject', 'allowguest' and 'autocreatepeer'.

See also :

http://downloads.asterisk.org/pub/security/AST-2013-003.html
https://issues.asterisk.org/jira/browse/ASTERISK-21013

Solution :

Upgrade to Asterisk 1.8.20.2 / 10.12.2 / 11.2.2 / Certified Asterisk
1.8.15-cert2 / Asterisk Business Edition C.3.8.1, or apply the
appropriate patch listed in the Asterisk advisory.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 4.1
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 65898 ()

Bugtraq ID: 58764

CVE ID: CVE-2013-2264