GLSA-200610-15 : Asterisk: Multiple vulnerabilities

This script is Copyright (C) 2006-2015 Tenable Network Security, Inc.

Synopsis :

The remote Gentoo host is missing one or more security-related

Description :

The remote host is affected by the vulnerability described in GLSA-200610-15
(Asterisk: Multiple vulnerabilities)

Asterisk contains buffer overflows in channels/chan_mgcp.c from the
MGCP driver and in channels/chan_skinny.c from the Skinny channel
driver for Cisco SCCP phones. It also dangerously handles
client-controlled variables to determine filenames in the Record()
function. Finally, the SIP channel driver in channels/chan_sip.c could
use more resources than necessary under unspecified circumstances.

Impact :

A remote attacker could execute arbitrary code by sending a crafted
audit endpoint (AUEP) response, by sending an overly large Skinny
packet even before authentication, or by making use of format strings
specifiers through the client-controlled variables. An attacker could
also cause a Denial of Service by resource consumption through the SIP
channel driver.

Workaround :

There is no known workaround for the format strings vulnerability at
this time. You can comment the lines in /etc/asterisk/mgcp.conf,
/etc/asterisk/skinny.conf and /etc/asterisk/sip.conf to deactivate the
three vulnerable channel drivers. Please note that the MGCP channel
driver is disabled by default.

See also :

Solution :

All Asterisk users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=net-misc/asterisk-1.2.13'

Risk factor :

High / CVSS Base Score : 7.8
CVSS Temporal Score : 6.6
Public Exploit Available : false

Family: Gentoo Local Security Checks

Nessus Plugin ID: 22930 (gentoo_GLSA-200610-15.nasl)

Bugtraq ID:

CVE ID: CVE-2006-4345

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now