FreeBSD : asterisk -- Mitigation for libcURL HTTP request injection vulnerability (7656fc62-a7a7-11e4-96ba-001999f8d30b)

high Nessus Plugin ID 81097

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

The Asterisk project reports :

CVE-2014-8150 reported an HTTP request injection vulnerability in libcURL. Asterisk uses libcURL in its func_curl.so module (the CURL() dialplan function), as well as its res_config_curl.so (cURL realtime backend) modules.

Since Asterisk may be configured to allow for user-supplied URLs to be passed to libcURL, it is possible that an attacker could use Asterisk as an attack vector to inject unauthorized HTTP requests if the version of libcURL installed on the Asterisk server is affected by CVE-2014-8150.

Solution

Update the affected packages.

See Also

http://downloads.asterisk.org/pub/security/AST-2015-002.html

http://www.nessus.org/u?c65882fa

Plugin Details

Severity: High

ID: 81097

File Name: freebsd_pkg_7656fc62a7a711e496ba001999f8d30b.nasl

Version: 1.4

Type: local

Published: 1/30/2015

Updated: 1/6/2021

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:asterisk, p-cpe:/a:freebsd:freebsd:asterisk11, p-cpe:/a:freebsd:freebsd:asterisk13, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 1/29/2015

Vulnerability Publication Date: 1/12/2015