FreeBSD : asterisk -- remote heap overwrite vulnerability (1c0def84-5fb1-11db-b2e9-0008c79fa3d2)

This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Adam Boileau of Security-Assessment.com reports :

The Asterisk Skinny channel driver for Cisco SCCP phones
(chan_skinny.so) incorrectly validates a length value in the packet
header. An integer wrap-around leads to heap overwrite, and arbitrary
remote code execution as root.

See also :

http://www.nessus.org/u?6285b14b
http://marc.info/?l=bugtraq&m=116121567530170
http://www.nessus.org/u?18c456b1

Solution :

Update the affected packages.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 22884 (freebsd_pkg_1c0def845fb111dbb2e90008c79fa3d2.nasl)

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now