This script is Copyright (C) 2011-2015 Tenable Network Security, Inc.
The remote Fedora host is missing a security update.
The Asterisk Development Team has announced the final maintenance
release of Asterisk, version 220.127.116.11. This release is available for
immediate download at
Please note that Asterisk 18.104.22.168 is the final maintenance release
from the 1.6.2 branch. Support for security related issues will
continue until April 21, 2012. For more information about support of
the various Asterisk branches, see
The release of Asterisk 22.214.171.124 resolves several issues reported by
the community and would have not been possible without your
participation. Thank you!
The following is a sample of the issues resolved in this release :
- Don't broadcast FullyBooted to every AMI connection The
FullyBooted event should not be sent to every AMI
connection every time someone connects via AMI. It
should only be sent to the user who just connected.
(Closes issue #18168. Reported, patched by FeyFre)
- Fix thread blocking issue in the sip TCP/TLS
implementation. (Closes issue #18497. Reported by vois.
Tested by vois, rossbeer, kowalma, Freddi_Fonet. Patched
- Don't delay DTMF in core bridge while listening for DTMF
features. (Closes issue #15642, #16625. Reported by
jasonshugart, sharvanek. Tested by globalnetinc, jde.
Patched by oej, twilson)
- Fix chan_local crashs in local_fixup() Thanks OEJ for
tracking down the issue and submitting the patch.
(Closes issue #19053. Reported, patched by oej)
- Don't offer video to directmedia callee unless caller
offered it as well (Closes issue #19195. Reported,
patched by one47)
Additionally security announcements AST-2011-008, AST-2011-010, and
AST-2011-011 have been resolved in this release.
For a full list of changes in this release, please see the ChangeLog :
9 The Asterisk Development Team has announced the release of Asterisk
versions 126.96.36.199, 188.8.131.52.1, and 184.108.40.206, which are security
These releases are available for immediate download at
The release of Asterisk 220.127.116.11, 18.104.22.168, and 22.214.171.124 resolves
several issues as outlined below :
- AST-2011-008: If a remote user sends a SIP packet
containing a null, Asterisk assumes available data
extends past the null to the end of the packet when the
buffer is actually truncated when copied. This causes
SIP header parsing to modify data past the end of the
buffer altering unrelated memory structures. This
vulnerability does not affect TCP/TLS connections. --
Resolved in 126.96.36.199.1 and 188.8.131.52
- AST-2011-009: A remote user sending a SIP packet
containing a Contact header with a missing left angle
bracket (<) causes Asterisk to access a NULL pointer. --
Resolved in 184.108.40.206
- AST-2011-010: A memory address was inadvertently
transmitted over the network via IAX2 via an option
control frame and the remote party would try to access
it. -- Resolved in 220.127.116.11, 18.104.22.168.1, and 22.214.171.124
The issues and resolutions are described in the AST-2011-008,
AST-2011-009, and AST-2011-010 security advisories.
For more information about the details of these vulnerabilities,
please read the security advisories AST-2011-008, AST-2011-009, and
AST-2011-010, which were released at the same time as this
For a full list of changes in the current releases, please see the
Security advisories AST-2011-008, AST-2011-009, and AST-2011-010 are
available at :
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
See also :
Update the affected asterisk package.
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 3.7
Public Exploit Available : false