This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.
A telephony application running on the remote host is affected by a
denial of service vulnerability.
According to the version in its SIP banner, the version of Asterisk
running on the remote host is potentially affected by a denial of
A flaw exists in the PJSIP channel driver when the 'quality_frequency'
configuration is enabled on an AOR when the SIP server's challenges for
authentication challenges of the 'OPTIONS' request. A remote attacker
could use a specially crafted request to crash the program.
Note that Nessus has not tested for this issue but has instead relied
only on the application's self-reported version number.
See also :
Upgrade to Asterisk 12.1.1 or apply the appropriate patch listed in
the Asterisk advisory.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.6
Public Exploit Available : true