GLSA-200606-15 : Asterisk: IAX2 video frame buffer overflow

This script is Copyright (C) 2006-2015 Tenable Network Security, Inc.

Synopsis :

The remote Gentoo host is missing one or more security-related

Description :

The remote host is affected by the vulnerability described in GLSA-200606-15
(Asterisk: IAX2 video frame buffer overflow)

Asterisk fails to properly check the length of truncated video frames
in the IAX2 channel driver which results in a buffer overflow.

Impact :

An attacker could exploit this vulnerability by sending a specially
crafted IAX2 video stream resulting in the execution of arbitrary code
with the permissions of the user running Asterisk.

Workaround :

Disable public IAX2 support.

See also :

Solution :

All Asterisk users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=net-misc/asterisk-1.0.11_p1'

Risk factor :

High / CVSS Base Score : 7.5
CVSS Temporal Score : 7.5
Public Exploit Available : false

Family: Gentoo Local Security Checks

Nessus Plugin ID: 21708 (gentoo_GLSA-200606-15.nasl)

Bugtraq ID:

CVE ID: CVE-2006-2898

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now