Fedora 12 : asterisk-1.6.1.17-1.fc12 (2010-3381)

This script is Copyright (C) 2010-2015 Tenable Network Security, Inc.


Synopsis :

The remote Fedora host is missing a security update.

Description :

Update to 1.6.1.17 * AST-2010-003: Invalid parsing of ACL rules can
compromise security * AST-2010-002: This security release is intended
to raise awareness of how it is possible to insert malicious strings
into dialplans, and to advise developers to read the best practices
documents so that they may easily avoid these dangers. * AST-2010-001:
An attacker attempting to negotiate T.38 over SIP can remotely crash
Asterisk by modifying the FaxMaxDatagram field of the SDP to contain
either a negative or exceptionally large value. The same crash occurs
when the FaxMaxDatagram field is omitted from the SDP as well.

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

https://bugzilla.redhat.com/show_bug.cgi?id=561332
http://www.nessus.org/u?38419c6c

Solution :

Update the affected asterisk package.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Fedora Local Security Checks

Nessus Plugin ID: 47311 (fedora_2010-3381.nasl)

Bugtraq ID: 37153
38047

CVE ID: CVE-2010-0441

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now