Asterisk Multiple Vulnerabilities (AST-2011-013 / AST-2011-014)

This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.

Synopsis :

A telephony application running on the remote host is affected by
multiple vulnerabilities.

Description :

According to the version in its SIP banner, the version of Asterisk
running on the remote host is potentially affected by the following
vulnerabilities :

- An issue in the SIP protocol can lead to the enumeration
of endpoints with NAT settings different from the
default. Note that this is an issue with the SIP
protocol itself, and that updated versions of Asterisk
provide warnings and safer defaults. (AST-2011-013)

- A NULL pointer derefererence can lead to an application
crash by a remote, unauthenticated user when processing
a SIP request. Note that successful exploitation
requires that the 'automon' feature in features.conf be
enabled and that it is not by default. (AST-2011-014)

See also :

Solution :

Either update to Asterisk / or later or disable the
'automon' feature in features.conf.

Risk factor :

Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.6
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 57289 ()

Bugtraq ID: 50989

CVE ID: CVE-2011-4597

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now