This script is Copyright (C) 2013-2015 Tenable Network Security, Inc.
The remote Fedora host is missing a security update.
The Asterisk Development Team has announced the release of Asterisk
11.2.0. This release is available for immediate download at
The release of Asterisk 11.2.0 resolves several issues reported by the
community and would have not been possible without your participation.
The following is a sample of the issues resolved in this release :
- --- app_meetme: Fix channels lingering when hung up
under certain conditions (Closes issue ASTERISK-20486.
Reported by Michael Cargile)
- --- Fix stuck DTMF when bridge is broken. (Closes issue
ASTERISK-20492. Reported by Jeremiah Gowdy)
- --- Add missing support for 'who hung up' to chan_motif.
(Closes issue ASTERISK-20671. Reported by Matt Jordan)
- --- Remove a fixed size limitation for producing SDP and
change how ICE support is disabled by default. (Closes
issue ASTERISK-20643. Reported by coopvr)
- --- Fix chan_sip websocket payload handling (Closes
issue ASTERISK-20745. Reported by Inaki Baz Castillo)
- --- Fix pjproject compilation in certain circumstances
(Closes issue ASTERISK-20681. Reported by Dinesh
For a full list of changes in this release, please see the ChangeLog :
The Asterisk Development Team has announced a security release for
Asterisk 11, Asterisk 11.1.2. This release addresses the security
vulnerabilities reported in AST-2012-014 and AST-2012-015, and
replaces the previous version of Asterisk 11 released for these
security vulnerabilities. The prior release left open a vulnerability
in res_xmpp that exists only in Asterisk 11; as such, other versions
of Asterisk were resolved correctly by the previous releases.
This release is available for immediate download at
The release of these versions resolve the following two issues :
- Stack overflows that occur in some portions of Asterisk
that manage a TCP connection. In SIP, this is
exploitable via a remote unauthenticated session; in
XMPP and HTTP connections, this is exploitable via
remote authenticated sessions. The vulnerabilities in
SIP and HTTP were corrected in a prior release of
Asterisk; the vulnerability in XMPP is resolved in this
- A denial of service vulnerability through exploitation
of the device state cache. Anonymous calls had the
capability to create devices in Asterisk that would
never be disposed of. Handling the cachability of device
states aggregated via XMPP is handled in this release.
These issues and their resolutions are described in the security
For more information about the details of these vulnerabilities,
please read security advisories AST-2012-014 and AST-2012-015.
For a full list of changes in the current release, please see the
The security advisories are available at :
Thank you for your continued support of Asterisk - and we apologize
for having to do this twice!
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
See also :
Update the affected asterisk package.
Risk factor :
Medium / CVSS Base Score : 5.0