FreeBSD : asterisk -- Memory exhaustion on short SCCP packets (fab87bff-3ce5-11e7-bf9d-001999f8d30b)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

The Asterisk project reports :

A remote memory exhaustion can be triggered by sending an SCCP packet
to Asterisk system with 'chan_skinny' enabled that is larger than the
length of the SCCP header but smaller than the packet length specified
in the header. The loop that reads the rest of the packet doesn't
detect that the call to read() returned end-of-file before the
expected number of bytes and continues infinitely. The 'partial data'
message logging in that tight loop causes Asterisk to exhaust all
available memory.

See also :

http://downloads.asterisk.org/pub/security/AST-2017-004.html
http://www.nessus.org/u?0980b268

Solution :

Update the affected package.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 100314 ()

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now