FreeBSD : asterisk -- Remote Crash Vulnerability in WebSocket Server (94268da0-8118-11e4-a180-001999f8d30b)

medium Nessus Plugin ID 79956

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

The Asterisk project reports :

When handling a WebSocket frame the res_http_websocket module dynamically changes the size of the memory used to allow the provided payload to fit. If a payload length of zero was received the code would incorrectly attempt to resize to zero. This operation would succeed and end up freeing the memory but be treated as a failure.
When the session was subsequently torn down this memory would get freed yet again causing a crash.

Users of the WebSocket functionality also did not take into account that provided text frames are not guaranteed to be NULL terminated.
This has been fixed in chan_sip and chan_pjsip in the applicable versions.

Solution

Update the affected package.

See Also

http://downloads.asterisk.org/pub/security/AST-2014-019.html

http://www.nessus.org/u?b57cf33c

Plugin Details

Severity: Medium

ID: 79956

File Name: freebsd_pkg_94268da0811811e4a180001999f8d30b.nasl

Version: 1.5

Type: local

Published: 12/15/2014

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:asterisk11, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 12/11/2014

Vulnerability Publication Date: 10/30/2014

Reference Information

CVE: CVE-2014-9374