This script is Copyright (C) 2011-2015 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
The Asterisk Development Team reports :
The releases of Asterisk 220.127.116.11, 18.104.22.168, 22.214.171.124.2, and 126.96.36.199
resolve an issue that when decoding UDPTL packets, multiple heap based
arrays can be made to overflow by specially crafted packets. Systems
configured for T.38 pass through or termination are vulnerable. The
issue and resolution are described in the AST-2011-002 security
See also :
Update the affected packages.
Risk factor :
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now