This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.
A telephony application running on the remote host is affected by a
denial of service vulnerability.
According to the version in its SIP banner, the version of Asterisk
running on the remote host is potentially affected by a vulnerability
that could allow a remote, authenticated attacker to exhaust the
server of resources.
If an endpoint sends a provisional response to the server's re-INVITE
message, certain data structures are not freed. More iterations of
this sequence lead to exhaustion of all available RTP ports.
See also :
Upgrade to Asterisk Open Source 188.8.131.52 / 10.5.2, Business Edition
C.3.7.5, Certified Asterisk 1.8.11-cert4 or apply the patches listed in
the Asterisk advisory.
Risk factor :
Medium / CVSS Base Score : 4.0
CVSS Temporal Score : 3.0
Public Exploit Available : false