This script is Copyright (C) 2010-2015 Tenable Network Security, Inc.
The remote Fedora host is missing a security update.
Update to 126.96.36.199 * AST-2010-003: Invalid parsing of ACL rules can
compromise security * AST-2010-002: This security release is intended
to raise awareness of how it is possible to insert malicious strings
into dialplans, and to advise developers to read the best practices
documents so that they may easily avoid these dangers. * AST-2010-001:
An attacker attempting to negotiate T.38 over SIP can remotely crash
Asterisk by modifying the FaxMaxDatagram field of the SDP to contain
either a negative or exceptionally large value. The same crash occurs
when the FaxMaxDatagram field is omitted from the SDP as well.
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
See also :
Update the affected asterisk package.
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.3
Public Exploit Available : false
Family: Fedora Local Security Checks
Nessus Plugin ID: 47325 (fedora_2010-3724.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now